期刊文献+

一种基于双重Counter Bloom Filter的长流识别算法 被引量:25

Algorithm Based on Double Counter Bloom Filter for Large Flows Identification
下载PDF
导出
摘要 提出了一种基于双层Counter Bloom Filter的长流识别算法(algorithm based on double counter bloom filter for long flows identification,简称CCBF).该算法使用两层Counter Bloom Filter结构,将长流过滤和长流存在分开处理.分析了该算法的误判率,通过模拟数据分析了算法错误率和内存资源限制的关系,并在相同内存资源限制的条件下,将该算法与类似算法的准确性进行了比较.结果表明,在数据量较大的情况下,该算法具有比现有算法更小的平均错误率;对算法的时间效率分析表明,该算法可以达到1500kpps的处理速度.各项指标反映出,该算法可以应用于大规模主干网的长流监测. An algorithm based on double counter bloom filter for long flows identification (CCBF) is proposed in this paper. Double counter bloom filter structure is used to distinguish the process of the long flow filtration from the long flow existence. The false positive rate of the algorithm is analyzed. The relationship of the memory requirement and the error rate is analyzed through simulation. It is shown that with the same restriction of the memory resource, the average error of this algorithm is less than the existing similar algorithms. The analysis of the time performance shows this algorithm is capable of dealing with traffic up to 1 500kpps.The results reflect that this algorithm can be used to monitor the long flows on backbone network.
出处 《软件学报》 EI CSCD 北大核心 2010年第5期1115-1126,共12页 Journal of Software
基金 国家重点基础研究发展计划(973)(Nos.2003CB304804 2009CB320505) 国家科技支撑计划 No.2008BAH37B04~~
关键词 长流识别 双重 计数Bloom FILTER 网络测量 主干网 large flow identification double counter bloom filter network measurement backbone network
  • 相关文献

参考文献2

二级参考文献25

  • 1[1]The Passive Measurement and Analysis[EB/OL].http://pma.nlanr.net/Traces/,[2005]2006-5-10.
  • 2[2]The Cooperative Association for Internet Data Analysis[EB/OL].http://www.caida.org/data/,2006-5-10.
  • 3[3]Measurement and Analysis on the WIDE Internet[EB/OL].http://tracer.csl.sony.co.jp/mawi/,[1999]2006-5-9.
  • 4[4]Lawrence Berkeley National Laboratory and The International Computer Science Institute[EB/OL].http://www.icir.org/enterprisetracing/download.html,[2005]2006-3-11.
  • 5[5]Association for Computing Machinery[EB/OL].http://ita.ee.lbl.gov/index.html,[2000]2006-3-22.
  • 6[7]XU J,FAN J,AMMAR M H,et al.Prefix-preserving IP address anonymization:measurement-based security evaluation and a new cryptography-based scheme[J].Computer Networks,2004,46(2):253-272.
  • 7[8]Cryptography-based Prefix-preserving Anonymization[EB/OL]http://www.cc.gatech.edu/computing/Telecomm/cryptopan/,2005-7-1.
  • 8[9]BRADEN R,BORMAN D,PARTRIDGE C.RFC1071,Computing the internet checksum.[EB/OL].New York:IETF.http://www.ietf.org/rfc/rfc1071.txt?number=1071,1988-9[2006-6-8].
  • 9[11]DAEMEN J,RIJMEN V.AES Proposal:Rijndael[R].1999-3-9.
  • 10[12]PANG R,ALLMAN M,PAXSON V,et al.The devil and packet trace anonymization[J].Computer Communication Review,2006,36(1):29-38.

共引文献16

同被引文献272

引证文献25

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部