基于布隆滤波和CAM的非冲突哈希方案

Yunzhao Li
{"title":"基于布隆滤波和CAM的非冲突哈希方案","authors":"Yunzhao Li","doi":"10.1109/WMWA.2009.64","DOIUrl":null,"url":null,"abstract":"Hash tables are fundamental components of several network processing algorithms and applications, including route lookup, intrusion detection, viruses, worms and other malicious code detection and filtering. Collisions exist in common hash tables, which can critically affect the worst-case throughput of an application, since the number of memory accesses required for each lookup can vary. A non-collision hash scheme was presented, assuring at most one memory access for each lookup. Using Bloom Filter (BF) and CAM, this new algorithm is flexible and items can be inserted or deleted quickly. Through a combination of analysis and simulations we show that our algorithm achieves better worst-case performance than the BF based hash table using the same amount of memory and a small amount of additional CAM.","PeriodicalId":375180,"journal":{"name":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Non-collision Hash Scheme Using Bloom Filter and CAM\",\"authors\":\"Yunzhao Li\",\"doi\":\"10.1109/WMWA.2009.64\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hash tables are fundamental components of several network processing algorithms and applications, including route lookup, intrusion detection, viruses, worms and other malicious code detection and filtering. Collisions exist in common hash tables, which can critically affect the worst-case throughput of an application, since the number of memory accesses required for each lookup can vary. A non-collision hash scheme was presented, assuring at most one memory access for each lookup. Using Bloom Filter (BF) and CAM, this new algorithm is flexible and items can be inserted or deleted quickly. Through a combination of analysis and simulations we show that our algorithm achieves better worst-case performance than the BF based hash table using the same amount of memory and a small amount of additional CAM.\",\"PeriodicalId\":375180,\"journal\":{\"name\":\"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WMWA.2009.64\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second Pacific-Asia Conference on Web Mining and Web-based Application","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WMWA.2009.64","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

哈希表是几种网络处理算法和应用程序的基本组成部分,包括路由查找、入侵检测、病毒、蠕虫和其他恶意代码检测和过滤。冲突存在于公共散列表中,这可能严重影响应用程序的最坏情况吞吐量,因为每次查找所需的内存访问次数可能会有所不同。提出了一种非冲突散列方案,保证每次查找最多访问一次内存。该算法采用了布隆过滤器(BF)和CAM,具有较强的灵活性,可以快速插入或删除条目。通过分析和仿真相结合,我们表明,在使用相同内存量和少量额外CAM的情况下,我们的算法比基于BF的哈希表获得了更好的最坏情况性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Non-collision Hash Scheme Using Bloom Filter and CAM
Hash tables are fundamental components of several network processing algorithms and applications, including route lookup, intrusion detection, viruses, worms and other malicious code detection and filtering. Collisions exist in common hash tables, which can critically affect the worst-case throughput of an application, since the number of memory accesses required for each lookup can vary. A non-collision hash scheme was presented, assuring at most one memory access for each lookup. Using Bloom Filter (BF) and CAM, this new algorithm is flexible and items can be inserted or deleted quickly. Through a combination of analysis and simulations we show that our algorithm achieves better worst-case performance than the BF based hash table using the same amount of memory and a small amount of additional CAM.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信