期刊文献+

基于网络数据流局部性的连接管理优化方法 被引量:2

Connection Management Optimization Method Based on Network Dataflow Locality
下载PDF
导出
摘要 根据高速网络环境下连接管理的性能需求,提出一种连接管理优化方法,即将MTF启发法应用于连接表。网络数据流的局部性特点表现为,属于同一个连接的一组数据包可能在短时间内集中到达。基于此,应用MTF启发法优化连接表的查找操作,形成MTF连接表。给出优化后的连接管理算法流程。借助实际高速网络数据流,对MTF连接表优化方法进行性能评估。实验结果表明,MTF连接表的查找性能明显优于传统的排序连接表。 Targeting the performance requirements of connection management in high-speed networks, an optimization of connection management is proposed, applying Move to Front(MTF) heuristic to improve the lookup operation of connection table. The locality property of network traffic is analyzed, which is exhibited as a group of packets within a connection probably arrive in group in a short time. Based on the property, the MTF heuristic is applied to optimize the lookup operation of connection table, and get the MTF connection table. The implementation of optimized connection management is described. The optimization and the MTF connection table, with physical high-speed network traffic are evaluated. Experimental results indicate that the lookup performance of MTF connection table is superior to that of the traditional sorted connection table.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第24期86-87,90,共3页 Computer Engineering
基金 国家自然科学基金资助项目(6097311) 湖南省教育厅科学研究基金资助项目(11C0036) 长沙理工大学人才引进基金资助项目
关键词 高速网络 连接管理 网络数据流局部性 MTF启发法 high-speed network connection management network dataflow locality Move to Front(MTF) heuristic
  • 相关文献

参考文献7

  • 1苏晓珂,兰洋,秦玉明,万仁霞,程耀东.混合属性数据流的两阶段入侵检测算法[J].计算机工程,2010,36(18):19-20. 被引量:2
  • 2Song Haoyu, Dharmapurikar S, Turner J, et al. Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing[J]. ACM SIGCOMM Computer Communication Review, 2005, 35(4): 181-192.
  • 3Paxson V. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.
  • 4Li Xin, Ji Zhengzhou, Hu Mingzeng. Stateful Inspection Firewall Session Table Processing[J]. International Journal of Information Technology, 2005, 11(2): 21-30.
  • 5Oh J, Kim B, Yoon S, et al. Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System[J]. International Journal of Computer Science and Network Security, 2007, 7(5): 110-117.
  • 6Gulati N, Williamson C, Bunt R. LAN Traffic Locality: Characteri- zation and Application[C] //Proc. of the 1st International Confer- ence in Local Area Network Interconnection. New York, USA: Plenum Publishing Corporation, 1993: 233-250.
  • 7Williamson C. Internet Traffic Measurement[J]. IEEE Internet Computing, 2001, 5(6): 70-74.

二级参考文献5

  • 1俞研,郭山清,黄皓.基于数据流的异常入侵检测[J].计算机科学,2007,34(5):66-71. 被引量:11
  • 2Oh S,Kang J,Byun Y,et al.Intrusion Detection Based on Clustering a Data Stream[C] //Proc.of the 3rd ACIS Int'l Conf.on Software Engineering Research,Management and Applications.Mount Pleasant,USA:[s.n.] ,2005:220-227.
  • 3Jiang Shengyi,Song Xiaoyu.A Clustering-based Method for Unsupervised Intrusion Detections[J].Pattern Recognition Letters,2006,27(5):802-810.
  • 4Aggarwal C C,Han Jiawei,Wang Jianyong,et al.A Framework for Clustering Evolving Data Streams[C] //Proc.of the 29th Int'l Conf.on Very Large Data Bases.Berlin,Germany:[s.n.] ,2003:81-92.
  • 5周刚,刘渊,陈晓光.基于小波的DDoS入侵流分析[J].计算机工程,2008,34(15):156-158. 被引量:6

共引文献1

同被引文献20

  • 1Dharmapurikar S, Paxson V. Robust TCP Stream Reassembly in the Presence of Adversaries[C]//Proc. of the 14th Conference on USENIX Security Symposium. Baltimore, USA: ACM Press, 2005.
  • 2Thompson K, Miller G, Wilder R. Wide-area Internet Traffic Patterns and Characteristics[J]. IEEE Communications Society, 1997, 11(6): 10-23.
  • 3Song Haoyu, Dharmapurikar S, Turner J, et al. Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing[J]. ACM SIGCOMM Computer Com- munication Review, 2005, 35(4): 181-192.
  • 4Li Xin, Ji Zhengzhou, Hu Mingzeng. Stateful Inspection Firewall Session Table Processing[J]. International Journal of Information Technology, 2005, 11(2): 21-30.
  • 5Roesch M. Snort-lightweight Intrusion Detection for Net- works[C]//Proc. of the 13th USENIX Conference on System Administration. Seattle, USA: ACM Press, 1999.
  • 6Paxson V. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.
  • 7Oh J, Kim B, Yoon S, et al. Architecture and Mechanisms for Implementing an FPGA-based Stateful Intrusion Detection System[J]. International Journal of Computer Science and Network Security, 2007, 7(5): 110-117.
  • 8Yoon S, Kim B, Oh J, et al. High Performance Session State Management Scheme for Stateful Packet Inspection[C]//Proc. of the 10th Asia-Pacific Conference on Network Operations and Management Symposium: Managing Next Generation Networks and Services. Berlin, Germany: Springer-Verlag, 2007.
  • 9Kim H, Kim J H, Kang I, et al. Preventing Session Table Explosion in Packet Inspection Computers[J]. IEEE Transactions on Computers, 2005, 54(2): 238-240.
  • 10梁喜梅,李震,郗富昭.Excell-2000成像测井仪数字通信系统的接口设计[J].石油仪器,2010,24(3):5-7. 被引量:1

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部