Title :
Efficient Flow Sampling With Back-Annotated Cuckoo Hashing
Author :
Pontarelli, Salvatore ; Reviriego, Pedro ; Maestro, Juan Antonio
Author_Institution :
Consorzio Naz. Interuniv. perle Telecomun. (CNIT), Rome, Italy
Abstract :
One of the applications of network traffic monitoring is to detect anomalies and security threats. Due to the huge number of packets that traverse networks, monitoring is typically implemented by sampling the traffic. Sampling can be done per packet or per flow. For flow sampling, the decision to select a flow can be purely random or based on some properties of the flows. In this later case, each incoming packet has to be compared against the set of flows being monitored to determine if the packet belongs to any of those flows. This matching can be implemented using a content addressable memory (CAM) or hash based data structures. Among those, one option is Cuckoo hashing that provides good memory utilization and a deterministic worst number of memory accesses. However, in the case of flow sampling, most packets will not belong to any of the flows being monitored. Therefore, all tables will be accessed and the worst case number of accesses will be required thus reducing throughput. In this letter, a technique to reduce the average number of accesses to search for items that are not stored in the Cuckoo hash is proposed and evaluated. The results show that the proposed scheme can significantly reduce the average number of accesses in a flow sampling application. This means that the technique can be used to increase the throughput substantially.
Keywords :
content-addressable storage; file organisation; sampling methods; telecommunication network planning; telecommunication security; telecommunication traffic; CAM; anomaly threats; back-annotated cuckoo hashing; content addressable memory; flow sampling; hash based data structures; network traffic monitoring; security threats; Computer aided manufacturing; Hardware; Internet; Monitoring; Radiation detectors; Security; Throughput; Cuckoo hashing; Traffic monitoring; flow sampling; intrusion detection; security;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2014.2347959