layer based bloom filter security




Design and implementation of a string matching system for network intrusion detection using FPGA-based bloom filters
FREE DOWNLOAD (PDF) 
S Dharmapurikar, M Attig ,Washington University in St , 2004 ,algo-logic.com
 and is used widely today for different purposes including web caching, intrusion detection, content
based routing [3  The main components of the system are Bloom filter engines and a hash table. 
on the link are parsed by the protocol wrappers [2] and the application layer data is .

Apoidea: A decentralized peer-to-peer architecture for crawling the world wide web
FREE DOWNLOAD (PDF) 
A Singh, M Srivatsa, L Liu ,Distributed Multimedia Information , 2004 ,Springer
 D and forwards them to Peer Q. Recall that Peer Q maintains a bloom filter which indicates  Based
on an identifier matching criteria, URLs are crawled at their assigned peers and cleanly  in the
P2P network is equipped with the Apoidea middleware, a two-layer software system. 

High-speed dynamic packet filtering
FREE DOWNLOAD (PDF) 
L Deri ,Journal of Network and Systems Management, 2007 ,Springer
 Instead of accounting P2P traffic that it is quite hard using classic signature-based techniques,
the  standard port is detected (eg http on a port that’s not 80), a new bloom filter is dynamically 
author wants to have a fast implementation able to sit under the BPF layer, blooms have 

A multi-layer framework for puzzle-based denial-of-service defense
FREE DOWNLOAD (PDF) 
XF Wang ,International Journal of Information Security, 2008 ,Springer
 123 Page 5. A multi-layer framework for puzzle-based DoS defense 247 4.1.2 The
Protocol  123 Page 6. 248 X. Wang, MK Reiter 4.1.3 Security analysis Here, we analyze
the security of the proposed puzzle auction mechanism. 

On the security of wireless sensor networks
FREE DOWNLOAD (PDF) 
  Science and Its Applications–ICCSA 2005, 2005 ,Springer
 amount of traffic created by false aggregations (eg by using a Bloom filter [28  Proof-based systems
usually require a negotiation between the aggregator node and its witnesses  Wireless medium
access control and physical layer specifications for low-rate wireless personal area 

WSN Link-layer Security Frameworks
FREE DOWNLOAD (PDF) 
I Krontiris, T Dimitriou, H Soroush , Networks Security, 2008 ,m-chair.net
 are not aware of the operations on encryption and authentication taking place at the link layer. 
the broad- cast mode the authors propose the use of a Bloom-filter2 based mechanism that  2A
Bloom filter is a space-efficient probabilistic data structure that is used to test whether an 

Context discovery using attenuated bloom filters in ad-hoc networks
FREE DOWNLOAD (PDF) 
F Liu ,Wired/Wireless Internet Communications, 2006 ,Springer
 A Bloom filter [8] is a data structure for representing a set in order to support mem- bership  such
as speeding-up cache lookups [11], group manage- ment [12], and hotspot-based trace back 
The first layer of the filter contains the context type information for the current node, while 

Enhancing network intrusion detection with integrated sampling and filtering
FREE DOWNLOAD (PDF) 
J Gonzalez ,Recent Advances in Intrusion Detection, 2006 ,Springer
 whether to filter packets from the connection in or out (essentially a Bloom filter [1]). Testing  Given
unbiased sampling (which our BPF “random” operator provides, unlike previous approaches
based on masking  (IP source and destination addresses, transport-layer source and 

Privacy-enhanced searches using encrypted bloom filters
FREE DOWNLOAD (PDF) 
SM Bellovin, WR Cheswick ,Proceedings , 2004 ,academiccommons.columbia.edu
 The performance of a system based on this design is limited by two factors: the speed of  single
PH- form query can be split into different size pieces, to accomodate different Bloom filter sizes. 
We do note, though, that security is a total systems property; some such layer is likely a 

An enhanced security architecture for wireless sensor network
FREE DOWNLOAD (PDF) 
SM Youssef, AB Mohamed ,DNCOCO, 2009 ,wseas.us
 present a novel Pairwise Key based security architecture, a secure network layer protocol for 
In broadcast mode, we employ a Bloom-filter based replay protection mechanism that avoids
per-sender  Our aim is to enhance MiniSec-U security level by using two security primitives 

Internet worm and virus protection in dynamically reconfigurable hardware
FREE DOWNLOAD (PDF) 
JW Lockwood, J Moscola, M Kulig ,Proceedings of the , 2003 ,arl.wustl.edu
 In addition, a Bloom filter was developed to enable large numbers of fixed-length strings to be 
in hardware are used to reassemble individual ATM cells into complete Adaptation Layer 5 (AAL5 
For Gigabit Ethernet, the FPX has a GBIC to interface to fiber-based or copper 

Analysis of security protocol MiniSec for Wireless Sensor Networks
FREE DOWNLOAD (PDF) 
L Tobarra, D Cazorla, F Cuartero ,Proc. of the IV Congreso , 2007 ,info-ab.uclm.es
 MiniSec[18] is a secure network layer protocol for wireless sensor networks.  MiniSec-B also uses
OCB encryption, but instead of synchronized counters, it describes two mechanism, a
timing-based approach and a bloom-filter approach, that defend against replay attacks. 

Publish–Subscribe Internetworking Security Aspects
FREE DOWNLOAD (PDF) 
 GF Marias ,Trustworthy Internet, 2011 ,Springer
 approach might introduce significant delays, but fulfills the demand for strong anonymity support
at the network layer.  1 Publish–Subscribe Internetworking Security Aspects 9  A for- warding path
is realized through zFilters [14], a Bloom filter based structure that contains the link 


CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER

IEEE PAPER UNITED STATES