Energy-efficient pipelined bloom filters for network intrusion detection

I Kaya, T Kocak

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)
319 Downloads (Pure)


Software-based detection techniques are commonly used to identify the predefined signatures in network streams. However, the software-based techniques can not keep up with the speeds that network bandwidth increases. Hence, hardware-based systems have started to emerge. Bloom filters are frequently used to identify malicious content like viruses in high speed networks. However, architectures proposed to implement Bloom filters are not power efficient. We propose a new Bloom filter architecture that exploits the well-known pipelining technique. Through extensive power analysis we show that pipelining can reduce the power consumption of Bloom filters up to 90%, which leads to the energy-efficient implementation of network intrusion detection systems
Translated title of the contributionEnergy-Efficient Pipelined Bloom Filters for Network Intrusion Detection
Original languageEnglish
Title of host publication2006 IEEE International Conference on Communications (ICC 2016)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Electronic)1424403553
Publication statusPublished - 2006
EventInternational Conference on Communications (ICC) - Istanbul, Turkey
Duration: 1 Jun 2006 → …

Publication series

ISSN (Print)1550-3607


ConferenceInternational Conference on Communications (ICC)
Period1/06/06 → …

Bibliographical note

Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Name and Venue of Conference: IEEE International Conference on Communications, Turkey
Conference Organiser: IEEE
Rose publication type: Conference contribution

Terms of use: Copyright © 2006 IEEE. Reprinted from IEEE International Conference on Communications, 2006.

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.


Dive into the research topics of 'Energy-efficient pipelined bloom filters for network intrusion detection'. Together they form a unique fingerprint.

Cite this