layer based bloom filter security
Design and implementation of a string matching system for network intrusion detection using FPGA-based bloom filters
FREE DOWNLOAD (PDF)
S Dharmapurikar, M Attig ,Washington University in St , 2004 ,algo-logic.com
and is used widely today for different purposes including web caching, intrusion detection, content
based routing [3 The main components of the system are Bloom filter engines and a hash table.
on the link are parsed by the protocol wrappers [2] and the application layer data is .
Apoidea: A decentralized peer-to-peer architecture for crawling the world wide web
FREE DOWNLOAD (PDF)
A Singh, M Srivatsa, L Liu ,Distributed Multimedia Information , 2004 ,Springer
D and forwards them to Peer Q. Recall that Peer Q maintains a bloom filter which indicates Based
on an identifier matching criteria, URLs are crawled at their assigned peers and cleanly in the
P2P network is equipped with the Apoidea middleware, a two-layer software system.
High-speed dynamic packet filtering
FREE DOWNLOAD (PDF)
L Deri ,Journal of Network and Systems Management, 2007 ,Springer
Instead of accounting P2P traffic that it is quite hard using classic signature-based techniques,
the standard port is detected (eg http on a port that’s not 80), a new bloom filter is dynamically
author wants to have a fast implementation able to sit under the BPF layer, blooms have
A multi-layer framework for puzzle-based denial-of-service defense
FREE DOWNLOAD (PDF)
XF Wang ,International Journal of Information Security, 2008 ,Springer
123 Page 5. A multi-layer framework for puzzle-based DoS defense 247 4.1.2 The
Protocol 123 Page 6. 248 X. Wang, MK Reiter 4.1.3 Security analysis Here, we analyze
the security of the proposed puzzle auction mechanism.
On the security of wireless sensor networks
FREE DOWNLOAD (PDF)
Science and Its Applications–ICCSA 2005, 2005 ,Springer
amount of traffic created by false aggregations (eg by using a Bloom filter [28 Proof-based systems
usually require a negotiation between the aggregator node and its witnesses Wireless medium
access control and physical layer specifications for low-rate wireless personal area
WSN Link-layer Security Frameworks
FREE DOWNLOAD (PDF)
I Krontiris, T Dimitriou, H Soroush , Networks Security, 2008 ,m-chair.net
are not aware of the operations on encryption and authentication taking place at the link layer.
the broad- cast mode the authors propose the use of a Bloom-filter2 based mechanism that 2A
Bloom filter is a space-efficient probabilistic data structure that is used to test whether an
Context discovery using attenuated bloom filters in ad-hoc networks
FREE DOWNLOAD (PDF)
F Liu ,Wired/Wireless Internet Communications, 2006 ,Springer
A Bloom filter [8] is a data structure for representing a set in order to support mem- bership such
as speeding-up cache lookups [11], group manage- ment [12], and hotspot-based trace back
The first layer of the filter contains the context type information for the current node, while
Enhancing network intrusion detection with integrated sampling and filtering
FREE DOWNLOAD (PDF)
J Gonzalez ,Recent Advances in Intrusion Detection, 2006 ,Springer
whether to filter packets from the connection in or out (essentially a Bloom filter [1]). Testing Given
unbiased sampling (which our BPF “random” operator provides, unlike previous approaches
based on masking (IP source and destination addresses, transport-layer source and
Privacy-enhanced searches using encrypted bloom filters
FREE DOWNLOAD (PDF)
SM Bellovin, WR Cheswick ,Proceedings , 2004 ,academiccommons.columbia.edu
The performance of a system based on this design is limited by two factors: the speed of single
PH- form query can be split into different size pieces, to accomodate different Bloom filter sizes.
We do note, though, that security is a total systems property; some such layer is likely a
An enhanced security architecture for wireless sensor network
FREE DOWNLOAD (PDF)
SM Youssef, AB Mohamed ,DNCOCO, 2009 ,wseas.us
present a novel Pairwise Key based security architecture, a secure network layer protocol for
In broadcast mode, we employ a Bloom-filter based replay protection mechanism that avoids
per-sender Our aim is to enhance MiniSec-U security level by using two security primitives
Internet worm and virus protection in dynamically reconfigurable hardware
FREE DOWNLOAD (PDF)
JW Lockwood, J Moscola, M Kulig ,Proceedings of the , 2003 ,arl.wustl.edu
In addition, a Bloom filter was developed to enable large numbers of fixed-length strings to be
in hardware are used to reassemble individual ATM cells into complete Adaptation Layer 5 (AAL5
For Gigabit Ethernet, the FPX has a GBIC to interface to fiber-based or copper
Analysis of security protocol MiniSec for Wireless Sensor Networks
FREE DOWNLOAD (PDF)
L Tobarra, D Cazorla, F Cuartero ,Proc. of the IV Congreso , 2007 ,info-ab.uclm.es
MiniSec[18] is a secure network layer protocol for wireless sensor networks. MiniSec-B also uses
OCB encryption, but instead of synchronized counters, it describes two mechanism, a
timing-based approach and a bloom-filter approach, that defend against replay attacks.
Publish–Subscribe Internetworking Security Aspects
FREE DOWNLOAD (PDF)
GF Marias ,Trustworthy Internet, 2011 ,Springer
approach might introduce significant delays, but fulfills the demand for strong anonymity support
at the network layer. 1 Publish–Subscribe Internetworking Security Aspects 9 A for- warding path
is realized through zFilters [14], a Bloom filter based structure that contains the link
CSE PROJECTS