Survey Bloom filter applications in network security: A state-of-the-art survey

作者: Shahabeddin Geravand , Mahmood Ahmadi

DOI: 10.1016/J.COMNET.2013.09.003

关键词:

摘要: Undoubtedly, dealing with security issues is one of the most important and complex tasks various networks face today. A large number algorithms have been proposed to enhance in types networks. Many these solutions are either directly or indirectly based on Bloom filter (BF), a space- time-efficient probabilistic data structure introduced by Burton 1970. Obviously, filters their variants getting more consideration network area. This paper provides an up-to-date survey application BFs improve performance approaches address problems different

参考文章(115)
Ju-Hyung Son, Haiyun Luo, Seung-Woo Seo, Authenticated flooding in large-scale sensor networks mobile adhoc and sensor systems. pp. 536- 543 ,(2005) , 10.1109/MAHSS.2005.1542841
Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese, An Improved Construction for Counting Bloom Filters Lecture Notes in Computer Science. pp. 684- 695 ,(2006) , 10.1007/11841036_61
M. Attig, S. Dharmapurikar, J. Lockwood, Implementation results of bloom filters for string matching field-programmable custom computing machines. pp. 322- 323 ,(2004) , 10.1109/FCCM.2004.41
Tieyan Li, Yongdong Wu, Huafei Zhu, An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks vehicular technology conference. ,vol. 2, pp. 831- 835 ,(2006) , 10.1109/VETECS.2006.1682941
W.T. Strayer, C.E. Jones, F. Tchakountio, R.R. Hain, SPIE-IPv6: single IPv6 packet traceback local computer networks. pp. 118- 125 ,(2004) , 10.1109/LCN.2004.118
P. Arun Kumar, High-Speed Signature Matching in Network Interface Device using Bloom Filters arXiv: Networking and Internet Architecture. ,(2009)
Tran Ngoc Thinh, Nguyen Duy Anh Tuan, Bui Trung Hieu, High performance pattern matching using Bloom-Bloomier Filter international conference on electrical engineering/electronics, computer, telecommunications and information technology. pp. 870- 874 ,(2010)
P. Du, A. Nakao, DDoS Defense Deployment with Network Egress and Ingress Filtering 2010 IEEE International Conference on Communications. pp. 1- 6 ,(2010) , 10.1109/ICC.2010.5502654
Jiyu Yang, Xingming Sun, Baowei Wang, Xiangrong Xiao, Xiaoliang Wang, Dong Luo, Bloom Filter-Based Data Hiding Algorithm in Wireless Sensor Networks 2010 5th International Conference on Future Information Technology. pp. 1- 6 ,(2010) , 10.1109/FUTURETECH.2010.5482761
Sang-heon Shim, Kyoung-min Yoo, Kyeong-eun Han, Chol-ku Kang, Won-ho So, Jong-tae Song, Young-chon Kim, Destination Address Monitoring Scheme for Detecting DDoS Attack in Centralized Control Network asia-pacific conference on communications. pp. 1- 5 ,(2006) , 10.1109/APCC.2006.255838