2018
DOI: 10.1007/978-3-319-73697-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 16 publications
0
9
0
2
Order By: Relevance
“…Approximate matching is accomplished by comparing similarity digests. A pairwise comparison of two file sets is needed to compare them [31].…”
Section: ) Approximate Matchingmentioning
confidence: 99%
See 1 more Smart Citation
“…Approximate matching is accomplished by comparing similarity digests. A pairwise comparison of two file sets is needed to compare them [31].…”
Section: ) Approximate Matchingmentioning
confidence: 99%
“…Rather of putting each hash into the node, the sub hashes are compared to the Bloom filter to see whether they are included inside it. If a node has a certain number of consecutive hashes, this is considered a match [31].…”
Section: ) Approximate Matchingmentioning
confidence: 99%
“…Estas estratégias utilizam alguns conceitos e processos das funções de pareamento para realizar a comparação dos arquivos de forma mais eficiente. Alguns exemplos de estratégias encontradas na literatura são MRSH-NET [Breitinger et al 2014a], MRSH-HBFT [Lillis et al 2017] e F2S2 [Winter et al 2013].…”
Section: Trabalhos Relacionadosunclassified
“…Com tal cenário estruturado, este trabalho avalia o comportamento de algumas das estratégias presentes na literatura quantoà sua capacidade de detecção de similaridade e o tempo de execução quando removemos os blocos comuns dos arquivos durante uma busca de similaridade. Inicialmente foram escolhidas duas estratégias baseadas na ferramenta sdhash disponíveis na literatura (MRSH-NET [Breitinger et al 2014a] e MRSH-HBFT [Lillis et al 2017]) para realização de experimentos. Em seguida foram realizadas implementações alternativas destas estratégias (NET-SD [Velho et al 2020] e HBFT-SD que foi modificado neste trabalho) e também modificações para remoção dos blocos comuns (NET-SD-NCF e HBFT-SD-NCF, ambos propostos neste trabalho).…”
Section: Introductionunclassified
“…Hashing is a primary tool used in digital investigation [18]. Hash-based techniques are used for a variety of purposes including finding known objects and finding similar objects, i.e., similarity hashing [19]. The National Software Reference Library (NSRL 1 ) maintained by the US National Institute of Standards and Technology (NIST) contains a list of known hash values for most common OS and application packages.…”
Section: A Digital Forensic Data Reductionmentioning
confidence: 99%