A Recent Survey on Bloom Filters in Network Intrusion Detection Systems
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS) is needed to protect the end-user machines from threats. An effective NIDS is therefore a network security system capable of protecting the end user machines well before a threat or intruder affects. NIDS requires a space efficient data base for detection of threats in high speed conditions. A bloom filter is a space efficient randomized data structure for representing a set in order to support membership queries. These Bloom filters allow false positive results (FPR) but the space saving capability often outweigh this drawback provided the probability of FPR is controlled. Research is being done to reduce FPR by modifying the structure of bloom filters and enabling it to operate in the increasing network speeds, thus variant bloom filters are being introduced. The aim of this paper is to survey the ways in which Bloom filters have been used and modified to be used in high speed Network Intrusion Detection Systems with their merits and demerits.
Authors and Affiliations
K. Saravanan , Dr. A. Senthil kumar , J. S. Dolian
A Hybrid System for Fingerprint Identification
Fingerprint-based identification is one of the core methodologies for person identification. It remains a reliable, efficient and commonly accepted biometric. The most popular and extensively used method for fingerprint...
The role of Quantum computation in molecular interactions in biological cells
We propose that the interacting molecules in a living cell are databases of quantum superpositions and scan each other for biologically relevant interactions. We discuss our hypothesis in view of the recent findings in w...
Prediction of Protein Secondary Structure using Artificial Neural Network
Structural information can provide insight into protein function, and therefore, high- accuracy prediction of protein structure from its sequence is highly desirable. We predicted the econdary structure of query protein...
Image Retrieval using DWT with Row and Column Pixel Distributions of BMP Image
With the rapid development of technology of multimedia, the traditional information retrieval techniques based on keywords are not sufficient, content - based image retrieval (CBIR) has been an active research topic. The...
“An Improved Round Robin Scheduling Algorithm for CPU scheduling”
There are many functions which are provided by operating ystem like process management, memory management, file management, input/output management, networking, protection system and command interpreter ystem. In these...