A low power lookup technique for multi-hashing network applications

I Kaya, T Kocak

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)
414 Downloads (Pure)

Abstract

Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail to identify so many signatures through comparisons at very high network speeds. Bloom filters are one of the main multi-hashing schemes utilized in hardware to support this level of security. Nevertheless Bloom filters consume significant power to store, retrieve and lookup virus signatures owing to many hash function computations required to index to the memory. We present a novel lookup technique and architecture to decrease the power consumption of multi-hashing schemes, predominantly Bloom filters, in hardware. The theoretical analysis has shown that power gain achieved through new lookup technique can go up to 90%. Simulation results with three different classes of the hash functions embedded into the Bloom filter have indicated that power consumption of the Bloom filters can be considerably decreased by employing the low power lookup technique
Translated title of the contributionA low power lookup technique for multi-hashing network applications
Original languageEnglish
Title of host publicationIEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures 2006, Karlsruhe, Germany
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages179 - 184
Number of pages6
ISBN (Print)0769525334
DOIs
Publication statusPublished - Mar 2006
EventIEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures - Karlsruhe, Germany
Duration: 1 Mar 2006 → …

Conference

ConferenceIEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures
Country/TerritoryGermany
CityKarlsruhe
Period1/03/06 → …

Bibliographical note

Conference Organiser: IEEE Computer Society
Rose publication type: Conference contribution

Terms of use: Copyright © 2006 IEEE. Reprinted from IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures, 2006.

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected].

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint

Dive into the research topics of 'A low power lookup technique for multi-hashing network applications'. Together they form a unique fingerprint.

Cite this