Standard pattern-matching methods used for deep packet inspection and network security can be evaded by means of TCP and IP fragmentation. To detect such attacks, intrusion …
Hash tables are used in many networking applications, such as lookup and packet classification. But the issue of collisions resolution makes their use slow and not suitable for …
G Antichi, A Di Pietro, D Ficara… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
Because of the rapid growth of both traffic and links capacity, the time budget to perform IP address lookup on a packet continues to decrease and lookup tables of routers unceasingly …
G Antichi, A Di Pietro, D Ficara… - … Conference on High …, 2009 - ieeexplore.ieee.org
IP address lookup is a fundamental task for Internet routers. Because of the rapid growth of both traffic and links capacity, the time budget to process a packet continues to decrease …
Y Fu, E Biersack - ACM Transactions on Modeling and Performance …, 2016 - dl.acm.org
Bloom filters are frequently used to to check the membership of an item in a set. However, Bloom filters face a dilemma: the transmission bandwidth and the accuracy cannot be …
Monitoring is a matter of the greatest importance for the correct operation of current communication networks. In spite of that, analyzing and checking out the traffic flowing over …
G Antichi, A Di Pietro, D Ficara… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
A Bloom Filter is an efficient randomized data structure for membership queries on a set with a certain known false positive probability. Bloom Filters (BFs) are very attractive for their …
N Bonelli - 2018 - tesidottorato.depositolegale.it
Over the last few years the Internet has become a pervasive network that inter-connects billions of users and heterogeneous devices. The speed at which ser-vices mutate and the …