DocumentCode
30906
Title
Efficient Flow Sampling With Back-Annotated Cuckoo Hashing
Author
Pontarelli, Salvatore ; Reviriego, Pedro ; Maestro, Juan Antonio
Author_Institution
Consorzio Naz. Interuniv. perle Telecomun. (CNIT), Rome, Italy
Volume
18
Issue
10
fYear
2014
fDate
Oct. 2014
Firstpage
1695
Lastpage
1698
Abstract
One of the applications of network traffic monitoring is to detect anomalies and security threats. Due to the huge number of packets that traverse networks, monitoring is typically implemented by sampling the traffic. Sampling can be done per packet or per flow. For flow sampling, the decision to select a flow can be purely random or based on some properties of the flows. In this later case, each incoming packet has to be compared against the set of flows being monitored to determine if the packet belongs to any of those flows. This matching can be implemented using a content addressable memory (CAM) or hash based data structures. Among those, one option is Cuckoo hashing that provides good memory utilization and a deterministic worst number of memory accesses. However, in the case of flow sampling, most packets will not belong to any of the flows being monitored. Therefore, all tables will be accessed and the worst case number of accesses will be required thus reducing throughput. In this letter, a technique to reduce the average number of accesses to search for items that are not stored in the Cuckoo hash is proposed and evaluated. The results show that the proposed scheme can significantly reduce the average number of accesses in a flow sampling application. This means that the technique can be used to increase the throughput substantially.
Keywords
content-addressable storage; file organisation; sampling methods; telecommunication network planning; telecommunication security; telecommunication traffic; CAM; anomaly threats; back-annotated cuckoo hashing; content addressable memory; flow sampling; hash based data structures; network traffic monitoring; security threats; Computer aided manufacturing; Hardware; Internet; Monitoring; Radiation detectors; Security; Throughput; Cuckoo hashing; Traffic monitoring; flow sampling; intrusion detection; security;
fLanguage
English
Journal_Title
Communications Letters, IEEE
Publisher
ieee
ISSN
1089-7798
Type
jour
DOI
10.1109/LCOMM.2014.2347959
Filename
6879332
Link To Document