Low-power bloom filter architecture for deep packet inspection

T Kocak, I Kaya

Research output: Contribution to journalArticle (Academic Journal)peer-review

41 Citations (Scopus)
644 Downloads (Pure)

Abstract

Bloom filters are frequently used to identify malicious content like viruses in high speed networks. However, architectures proposed to implement bloom filters are not power efficient. In this letter, we propose a new bloom filter architecture that exploits the well-known pipelining technique. Through power analysis we show that pipelining can reduce the power consumption of bloom filters up to 90%, which leads to the energy-efficient implementation of intrusion detection systems.
Translated title of the contributionLow-power bloom filter architecture for deep packet inspection
Original languageEnglish
Pages (from-to)210 - 212
Number of pages3
JournalIEEE Communications Letters
Volume10
Issue number3
DOIs
Publication statusPublished - Mar 2006

Bibliographical note

Publisher: Insitute of Electrical and Electronics Engineers (IEEE)
Rose publication type: Journal article

Terms of use: Copyright © 2006 IEEE. Reprinted from IEEE Communications Letters. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected].


By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Keywords

  • network intrusion detection
  • bloom filters
  • low-power design

Fingerprint

Dive into the research topics of 'Low-power bloom filter architecture for deep packet inspection'. Together they form a unique fingerprint.

Cite this