期刊文献+

一种基于并行Bloom Filter的高速URL查找算法 被引量:6

Fast URL Lookup Using Parallel Bloom Filters
下载PDF
导出
摘要 URL查找是众多网络系统中重要的组成部分,如URL过滤系统、Web缓存等.随着互联网的迅速发展,URL查找面临的主要挑战是实现大规模URL集合下的高速查找,同时保证低存储和低功耗.本文提出了一种基于并行Bloom Filter的URL查找算法,CaBF.该算法高度并行化,提供大规模URL集合下的高速最长前缀匹配,并很好地适应集合中不同数量的URL组件.理论分析和真实网络数据集上的实验表明,该算法相比现有算法可以降低假阳性概率达一个数量级(或者在满足相同假阳性概率的前提下降低存储和硬件逻辑资源消耗).此外,该方法的体系结构很容易映射到FPGA等硬件器件上,提供每秒超过150M次的URL查找速度. URL lookup is fundamental to numerous networking systems, including URL filters, web caches, etc. With the ex- plosive development of the Internet,the main challenge in implementing URL lookup operation is to achieve fast lookup speed and accommodate large URL sets while keeping memory and power consumption low. This paper presents a new URL lookup scheme based on parallel Bloom Filters.It can adapt to set cardinality and perform fast longest prefix matching(LPM) with large URL sets in a highly parallel fashion. The theoretical analysis and experiments on real-life data traces show that the proposed approach leads to reduced false positive probability for up to an order of magnitude( or reduced memory and hardware logic resources with the same false positive probability guaranteed)compmred with the existing methods. Moreover, the architecture can be easily mapped to the state-of-the-art FPGAs with moderate resource consumption to provide over 150M lookups per second.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第9期1833-1840,共8页 Acta Electronica Sinica
基金 国家高技术研究发展计划("863"计划)基金(No.2011AA010703) 中国科学院战略性先导科技专项基金(No.XDA06030200) 国家自然科学基金(No.61402474)
关键词 URL查找 布鲁姆过滤器 最长前缀匹配 现场可编程门阵列 URL lookup Bloom filter longest prefix matching FPGA
  • 相关文献

参考文献19

  • 1Broder A Z, et al. Efficient URL caching for world wide web crawling[ A ]. Proc of WWW 2003 [ C ]. Budapest, Hungary: ACM, 2003.679 - 689.
  • 2Fan L, et al. Summary cache: a scalable wide-area web cachesharing protocol[ J ]. IEEE/ACM Trans on Networking, 2000,8 (3) :281 - 293.
  • 3Huang N F,et al.A fast URL lookup engine for content-aware multi-gigabit switches [ A ]. Proc of AINA 2005 [ C ]. Taipei, Taiwan: IEEE Computer Society, 2005.641 - 646.
  • 4Zhou Z,et al.A high-performance URL lookup engine for URL filtering systems[ A] .Proc of ICC 2010[ C]. Cape Town,South Africa: IEEE Computer Society,2010,1 - 5.
  • 5Netcraft. September 2013 Web Server Survey [ EB/OL ]. http://news, netcraft, com, 2013-09- 30.
  • 6Michel B S, et al. URL forwarding and compression in adaptive web caching[ A ]. Proc of INFOCOM 2000[ C]. Tel-Aviv, Is- rael: mEE Computer Society,2000.670- 678.
  • 7Prodanoff Z G, et al. Managing muting tables for URL routers in content distribution networks [ J]. International Journal of Network Management, 2004,14(3) : 177 - 192.
  • 8Dhannapudkar S, et al. Longest prefix matching using bloom fllters[ J ]. IEEFJACM Trans on Networking, 2006,14 (2) : 397 -409.
  • 9Yu H, et al. A memory-efficient hashing by multi-predicate bloom filters for packet classification[ A ]. Proc of INFOCOM 2008[ C ]. Phoenix, USA: IEEE Computer Society, 2008. 1795 - 1803.
  • 10Chang F, et al. Bigtable: A distributed storage system for structured data[ J] .ACM Tram on Computer Systems,2008, 26(2) : 1 - 26.

二级参考文献33

  • 1龚俭,彭艳兵,杨望,刘卫江.基于BloomFilter的大规模异常TCP连接参数再现方法[J].软件学报,2006,17(3):434-444. 被引量:24
  • 2彭艳兵,龚俭,刘卫江,杨望.Bloom Filter哈希空间的元素还原[J].电子学报,2006,34(5):822-827. 被引量:7
  • 3陈伟,何炎祥,彭文灵.一种轻量级的拒绝服务攻击检测方法[J].计算机学报,2006,29(8):1392-1400. 被引量:26
  • 4谢鲲,闵应骅,张大方,谢高岗,文吉刚.分档布鲁姆过滤器的查询算法[J].计算机学报,2007,30(4):597-607. 被引量:14
  • 5Paxson V Bro.A system for detecting network intrders in real-time[J].In Computer Networks,1999,31(23-24):2435 -2463.
  • 6Roesch M.Snort-lightweight intrusion detection for networks[A].In Proceedings of the 13th USENIX Systems Administration Conference[C].Washington:USENIX,1999.229-238.
  • 7Pionka D.FlowScan:a network traffic flow reporting and visualization tool[A].In Proceedings of the 14th USENIX conference on System administration[C].New Orleans:USENIX,2000.305-318.
  • 8Keys K,Moore D,Koga R,et al.The architecture of Coral-Reef:an internet Waffle monitoring software suite[OL].http://www.caida.org/publications/papers/2001/CoralArch/coral-reef.pdf,2001.
  • 9Levchenko K,Pamri R,Varghese G.On the difficulty of scab ably detecting network attacks[A].In Proceedings of the 11th ACM Conferernce on Computer and Conmmunications security (CCS'04)[C].New York:ACM,2004.12-20.
  • 10Kompella R R,Singh S,Varghese G.On sealable attack detection in the network[A].In Proceedings of the 4th ACM SIG-COMM Conference on Internet Measurement[C].New York:ACM,2004.187-200.

共引文献45

同被引文献18

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部