Software-based detection techniques are commonly used to identify the predefined signatures in network streams. However, the software-based techniques can not keep up with the speeds that network bandwidth increases. Hence, hardware-based systems have started to emerge. Bloom filters are frequently used to identify malicious content like viruses in high speed networks. However, architectures proposed to implement Bloom filters are not power efficient. We propose a new Bloom filter architecture that exploits the well-known pipelining technique. Through extensive power analysis we show that pipelining can reduce the power consumption of Bloom filters up to 90%, which leads to the energy-efficient implementation of network intrusion detection systems
|Translated title of the contribution||Energy-Efficient Pipelined Bloom Filters for Network Intrusion Detection|
|Title of host publication||2006 IEEE International Conference on Communications (ICC 2016)|
|Publisher||Institute of Electrical and Electronics Engineers (IEEE)|
|Number of pages||6|
|Publication status||Published - 2006|
|Event||International Conference on Communications (ICC) - Istanbul, Turkey|
Duration: 1 Jun 2006 → …
|Conference||International Conference on Communications (ICC)|
|Period||1/06/06 → …|
Bibliographical notePublisher: Institute of Electrical and Electronics Engineers (IEEE)
Name and Venue of Conference: IEEE International Conference on Communications, Turkey
Conference Organiser: IEEE
Rose publication type: Conference contribution
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to email@example.com.
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.