期刊文献+

面向高速网络连接记录管理的高效哈希表 被引量:3

An efficient oriented-Hash table for connection record management in high-speed networks
原文传递
导出
摘要 针对高速网络环境下连接记录管理的性能需求,提出了一种改进的高效哈希表PRH-MTF(伪随机哈希-移至最前).首先在定义输入关键字即连接标识符的基础上,通过选择适当的运算符,设计了高效鲁棒的哈希函数PRH.为有效解决哈希冲突,根据网络数据流局部性特点,应用MTF启发法,改进了传统的链式冲突解决方法.以分组火车模型作为数据包到达模式,分析了PRH-MTF哈希表的算法复杂度,推导出了平均查找长度.最后通过实际高速网络数据流和模拟攻击的方式,对PRH-MTF哈希表进行了实验评估.实验结果表明,PRH-MTF哈希表在查找性能和抗攻击能力等方面均优于传统的简单排序哈希表. An improved efficient Hash table PRH-MTF (pseudo random hashing-move to front) was presented, after the performance requirements of connection record management in high-speed networks were considered. Firstly, an efficient and robust Hash function PRH by defining connection identifier as its input keyword and selecting suitable operators for it were designed. To resolve Hash collision efficiently, the MTF heuristic was applied to improve the traditional chaining resolution based on network traffic locality. Selecting packet train model as the packet arrival pattern, the complexity of PRH-MTF Hash table was analyzed and its average search length was deduced. Finally, PRH-MTF Hash table by experiments with physical high-speed network traffic and attack simulation were evaluated. Experimental results indicate that the PRH-MTF Hash table performs better than the traditional simple sorted Hash table in terms of lookup performance and robustness.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第2期19-22,31,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60973113)
关键词 高速网络 哈希表 连接记录管理 网络数据流局部性 移至最前启发法 High-speed networks Hash table connection record management network traffic locality move to front heuristic
  • 相关文献

参考文献10

  • 1Lunteren J V. Searching very large routing tables in wide embedded memory[C] // Proceedings of IEEE Global Communications Conference. San Antonio, Texas: IEEE Society, 2001: 1615-1619.
  • 2Lunteren J V, Engbersen T. Fast and scalable packet classification[J]. IEEE Journal on Selected Areas in Communications, 2003, 21(4): 560-571.
  • 3Ross K W, Yao D D. Optimal load balancing and scheduling in a distributed computer system [J]. Journal of the ACM, 1991, 38(3): 676-690.
  • 4Kim H, Kim J H, Kang I, et al. Preventing session table explosion in packet inspection computers[J]. IEEE Transactions on Computers, 2005, 54 (2): 238-240.
  • 5Song H, Dharmapurikar S, Turner J, et al. Fast Hash table lookup using extended bloom filter: an aid to network processing[J]. ACM SIGCOMM Com- puter Communication Review, 2005, 35 (4): 181- 192.
  • 6Roesch M. Snort-lightweight intrusion detection for networks[C] // Proceedings of USENIX Conference on System Administration. Berkeley, California: USENIX Association, 1999: 229-238.
  • 7Crosby S A, Wallach D S. Denial of service via algo- rithmic complexity attacks [C]//Proceedings of the 12th Conference on USENIX Security Symposium. Berkeley, California: USENIX Association, 2003.:29-44.
  • 8程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54
  • 9Jain R, Routhier S A. Packet trains: measurements and a new model for computer network traffic[J]. IEEE Journal on Selected Areas in Communications, 1986, 4(6): 986-995.
  • 10Williamson C. Internet traffic measurement [J].IEEE Internet Computing, 2001, 5(6): 70-74.

二级参考文献9

  • 1IP Flow information export (ipfix). 2004. http://www.ietf. org/html.charters/ipfix-charter.html
  • 2Thompson K, Miller G, Wilder R. Wide area Internet traffic patterns and characteristics. IEEE Network, 1997,11(6):10-23.
  • 3Cisco Netflow. 2004. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
  • 4Jain R. A comparison of hashing schemes for address lookup in computer networks. IEEE Trans. on Communications, 1992,40(3):1570-1573.
  • 5Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for Internet load balancing. In: Nokia FB, ed. Proc. of the IEEE INFOCOM 2000. Piscataway: IEEE Computer and Communications Societies, 2000. 332-341.
  • 6Duffield NG, Grossglauser M. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. on Networking, 2001,9(3):280-292.
  • 7NLANR network traffic packet header traces. 2004. http://pma.nlanr.net/Traces/
  • 8Niccolini S, Molina M, Duffield N. Hash functions description for packet selection. 2003. http://www.watersprings.org/pub/id/draft-niccolini-hash-descr-00.txt
  • 9程光,龚俭,丁伟.基于统计分析的高速网络分布式抽样测量模型[J].计算机学报,2003,26(10):1266-1273. 被引量:24

共引文献53

同被引文献25

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部