Proceedings of the Conference on Internet Measurement Conference - IMC '03 2003
DOI: 10.1145/948224.948225
|View full text |Cite
|
Sign up to set email alerts
|

Bitmap algorithms for counting active flows on high speed links

Abstract: In this paper we present a family of algorithms that address the problem of counting the number of distinct header patterns (flows) seen on a high speed link. Such counting can be used to detect DoS attacks and port scans, and to solve measurement problems. The central difficulty is that count processing must be done within a packet arrival time (8 nsec at OC-768 speeds) and, hence, must require only a small number of memory references to limited, fast memory. A naive solution that maintains a hash table requi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
86
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(86 citation statements)
references
References 0 publications
0
86
0
Order By: Relevance
“…The second category [1,3,9,10,13,14,16,18,19,21,23,42] is a sketch-based approach that scans the entire traffic and hashes each element into a sketch. The sketch is used at query time to estimate the distinct count.…”
Section: High Level Algorithm Classificationmentioning
confidence: 99%
See 2 more Smart Citations
“…The second category [1,3,9,10,13,14,16,18,19,21,23,42] is a sketch-based approach that scans the entire traffic and hashes each element into a sketch. The sketch is used at query time to estimate the distinct count.…”
Section: High Level Algorithm Classificationmentioning
confidence: 99%
“…The bucketbased algorithms are either pure-bucket-based [3,42] or hybridbucket-based algorithms. Hybrid-bucket algorithms can be further classified into hybrid-bucket-sampling algorithms [21,4], and hybrid-bucket-logarithmic algorithms [14].…”
Section: High Level Algorithm Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the RED+ECN method [8], we can extract the queue length from the router. The number of flows in the router can be estimated with the Direct Bitmap [9]. Like EWA (Explicit Window Adaptation), conveying information from the router to senders may be achieved by inserting the value into the TCP header of each packet leaving the access router (for example, in the TCP option field) and can be conveyed using the RWND (Receiver Window) field of the IP header [9].…”
Section: Window Control Algorithmmentioning
confidence: 99%
“…The number of flows in the router can be estimated with the Direct Bitmap [9]. Like EWA (Explicit Window Adaptation), conveying information from the router to senders may be achieved by inserting the value into the TCP header of each packet leaving the access router (for example, in the TCP option field) and can be conveyed using the RWND (Receiver Window) field of the IP header [9]. According to the information of the queue and the number of flows which is sent from a base station, each flow calculates its own window size that it must reach for fairness.…”
Section: Window Control Algorithmmentioning
confidence: 99%