• DocumentCode
    30906
  • Title

    Efficient Flow Sampling With Back-Annotated Cuckoo Hashing

  • Author

    Pontarelli, Salvatore ; Reviriego, Pedro ; Maestro, Juan Antonio

  • Author_Institution
    Consorzio Naz. Interuniv. perle Telecomun. (CNIT), Rome, Italy
  • Volume
    18
  • Issue
    10
  • fYear
    2014
  • fDate
    Oct. 2014
  • Firstpage
    1695
  • Lastpage
    1698
  • Abstract
    One of the applications of network traffic monitoring is to detect anomalies and security threats. Due to the huge number of packets that traverse networks, monitoring is typically implemented by sampling the traffic. Sampling can be done per packet or per flow. For flow sampling, the decision to select a flow can be purely random or based on some properties of the flows. In this later case, each incoming packet has to be compared against the set of flows being monitored to determine if the packet belongs to any of those flows. This matching can be implemented using a content addressable memory (CAM) or hash based data structures. Among those, one option is Cuckoo hashing that provides good memory utilization and a deterministic worst number of memory accesses. However, in the case of flow sampling, most packets will not belong to any of the flows being monitored. Therefore, all tables will be accessed and the worst case number of accesses will be required thus reducing throughput. In this letter, a technique to reduce the average number of accesses to search for items that are not stored in the Cuckoo hash is proposed and evaluated. The results show that the proposed scheme can significantly reduce the average number of accesses in a flow sampling application. This means that the technique can be used to increase the throughput substantially.
  • Keywords
    content-addressable storage; file organisation; sampling methods; telecommunication network planning; telecommunication security; telecommunication traffic; CAM; anomaly threats; back-annotated cuckoo hashing; content addressable memory; flow sampling; hash based data structures; network traffic monitoring; security threats; Computer aided manufacturing; Hardware; Internet; Monitoring; Radiation detectors; Security; Throughput; Cuckoo hashing; Traffic monitoring; flow sampling; intrusion detection; security;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2014.2347959
  • Filename
    6879332