期刊文献+

划分位无冲突哈希在trie树分组中的研究

Research on trie-tree partition processing using non-collision Hash functions based on partition bit
下载PDF
导出
摘要 随着网络带宽的不断增长,迫切需要时空高效的数据包处理技术,满足线速处理和低存储需求。在高速片上存储器上存储所有的攻击特征,可以实现对数据包的高速检测,但受限于有限的片上存储器空间。通过基于划分位构建无冲突哈希函数,实现对片上存储器有效的控制,攻击特征平均分配到trie树每层的多个组中。该结构可以在同一个芯片中实现流水并行地执行,获得比较大的吞吐量。理论及实验表明该方法在片上存储器一次就执行完复杂的完全匹配操作,显著地降低片上存储空间需求。 With the fast progress of Internet broadband,time and space efficient packet processing technology is urgently needed.One way to achieve high-speed packet processing is to store all the attack signatures on high-speed on-chip memory.Due to the limited on-chip memory,this paper proposes a new algorithm to create the non-collision functions based on middle-point partition.The algorithm evenly partitions attack signatures into multiple groups at each layer in trie tree.The data structure can be implemented on a single chip to perform pipelining and parallelism simultaneously,thus achieve high throughput.The theory and experimental results show that the algorithm can facilitate access to the signature string in the on-chip memory while allowing to perform the expensive exact match operations only once,and decreases the requirement of on-chip memory.
出处 《计算机工程与应用》 CSCD 2012年第11期88-92,共5页 Computer Engineering and Applications
关键词 无冲突哈希 划分位 trie树分组 片上存储 non-collision Hash partition bit trie-tree partition on-chip memory
  • 相关文献

参考文献10

  • 1Paxson V,Asanovic K,Dharmapurikar S,et al.Rethinkinghardware support for network analysis and intrusionprevention[C]//Proceedings of USENIX Workshop onHot Topics in Security.Boston:USENIX AssociationBerkeley Press,2006:63-68.
  • 2Lakshminarayanan K,Rangarajan A,Venkatachary S.Algo-rithms for advanced packet classification with ternaryCAMs[C]//Proceedings of ACM SIGCOMM.Philadel-phia:ACM Press,2005:193-204.
  • 3Clark C R,Schimmel,D E.Scalable pattern matching forhigh speed networks[C]//Proceedings of IEEE FCCM.Napa:IEEE Press,2004:249-257.
  • 4黄昆,张大方.一种面向深度数据包检测的索引拆分Bloom过滤器[J].中国科学:信息科学,2010,40(8):1062-1077. 被引量:3
  • 5Sourdis I,Pnevmatikatos D,Wong S,et al.A reconfigurableperfect-hashing scheme for packet inspection[C]//15th In-ternational Conference on Field Programmable Logicand Applications(FPL 2005).Tampere:IEEE Circuits andSystems Society,2005:644-647.
  • 6Lu Y,Prabhakar B,Bonomi F.Perfect hashing for net-work application[C]//IEEE Symposium on InformationTheory.NY:IEEE Press,2006:2774-2778.
  • 7Tan L,Sherwood T.Architectures for bit-split string scan-ning in intrusion detection[J].IEEE Micro,2006,26(1):110-117.
  • 8Jung H J,Baker Z K,Prasanna V K.Performance of FPGAimplementation of bit-split architecture for intrusion de-tection systems[C]//Proceedings of the ReconfigurableArchitectures Workshop at IPDPS(RAW’06).Rhodes Is-land:IEEE CS Press,2006:8-10.
  • 9Artan N S,Bando M,Chao H J.Boundary Hash formemory-efficient deep packet inspection[C]//IEEE Inter-national Conference on Communications(ICC 2008),Beijing,China,2008:1732-1737.
  • 10Ramakrishna M V,Fu E,Bahcekapili E.Efficient hardwarehashing functions for high performance computers[J].IEEE Transactions on Computers,1997,46(12):1378-1381.

二级参考文献41

  • 1Piyachon P,Luo Y.E?cient memory utilization on network processors for deep packet inspection. Proceedings of ACM/IEEE ANCS2006 . 2006
  • 2Kumar S,Turner J,Crowley P.Peacock hashing:deterministic and updatable hashing for high performance networking. Proceedings of IEEE INFOCOM2008 . 2008
  • 3Hua N,Lin B,Xu J.Rank-indexed hashing:a compact construction of Bloom filters and variants. Proceedings of IEEE ICNP2008 . 2008
  • 4Varghese G.Network Algorithms:an Interdisciplinary Approach to Designing Fast Network Devices. . 2004
  • 5F. Bonomi,M. Mitzenmacher,R. Panigrahy,S. Singh, et al.Beyond bloom filters: from approximate membership checksto approximate state machines. Proc. ACM SIGCOMM . 2006
  • 6Martin Roesch.Snort-Lightweight intrusion detection for networks. the Proceedings of the 13th Large Installation System Administration Conference . 1999
  • 7Justin Levandoski,Ethan Sommer,Matthew Strait,et al.Application Layer Packet Classifier for Linux. http://l7-filter.sourceforge.net/HOWTO-kernel . 2008
  • 8V. Paxson,K. Asanovic,J. Lockwood, et al.Rethinking Hardware Support for Network Analysis and Intrusion Prevention. USENIX First Workshop on Hot Topics in Security . 2006
  • 9Karthik Lakshminarayanan,Anand Rangarajan,Srinivasan Venkatachary.Algorithms for Advanced Packet Classification with Ternary CAMs. SIGCOMM‘05 . August21-262005
  • 10F. Yu,R. H. Katz,T. V. Lakshman.Gigabit rate packet pattern matching using Tcam. Proceedings of the Network Protocols, 12th IEEE International Conference on (ICNP’04) . 2004

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部