A Recent Survey on Bloom Filters in Network Intrusion Detection Systems
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Computer networks are prone to hacking, viruses and other malware; a Network Intrusion Detection System (NIDS) is needed to protect the end-user machines from threats. An effective NIDS is therefore a network security system capable of protecting the end user machines well before a threat or intruder affects. NIDS requires a space efficient data base for detection of threats in high speed conditions. A bloom filter is a space efficient randomized data structure for representing a set in order to support membership queries. These Bloom filters allow false positive results (FPR) but the space saving capability often outweigh this drawback provided the probability of FPR is controlled. Research is being done to reduce FPR by modifying the structure of bloom filters and enabling it to operate in the increasing network speeds, thus variant bloom filters are being introduced. The aim of this paper is to survey the ways in which Bloom filters have been used and modified to be used in high speed Network Intrusion Detection Systems with their merits and demerits.
Authors and Affiliations
K. Saravanan , Dr. A. Senthil kumar , J. S. Dolian
Public key cryptosystem and a key exchange protocol using tools of non-abelian group
Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a lock of encrypted data. We...
SELECT OF OPTIMAL SLEEP STATE IN ADAPTIVE SMAC USING DPM
Wireless sensor networks are networks with low power nodes and limited processing. The main problem in these networks is energy. This resource is not replaceable or rechargeable. Therefore, optimal energy consumption for...
Identity Recognizing using Iris Scan with multiple frames of Video
The field of iris biometrics has been significant research over the last decade. At this point, iris capture has become a main stream technology with wide acceptance. A general iris recognition system works with four dif...
Prevention Of WormholeAttacks In Geographic Routing Protocol
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boun...
Frequent Item set Mining Using Global Profit Weight Algorithm
The objective of the study focused on weighted based frequent item set mining. The base paper has proposed multi criteria based frequent item set for weight calculation. Contribution towards this project is to implement...