2020
DOI: 10.1109/access.2020.2990331
|View full text |Cite
|
Sign up to set email alerts
|

Packet Classification Using GPU and One-Level Entropy-Based Hashing

Abstract: The demand for on-line analyzing of internet traffic for both security and QoS consideration directly increases as a function of using diverse applications and as malicious attacks increase. This paper presents a new fast parallel packet classification algorithm based on entropy hashing. The algorithm uses a one-level hashing data structure and enables partitioning a very large rules-set into smaller uniformly distributed sub-rules look-up tables based on maximum entropy and Most Significant Bit (MSB) pattern … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 43 publications
(90 reference statements)
0
8
0
Order By: Relevance
“…Fig. 4 shows the result of mapping the rule "r: F1[1,7]F2 [2,6]→accept." to the two-dimensional matrix space M2, at this time, M2 contains a cell space, expressed as [(1,2)(7,5)].…”
Section: B Mpfpc Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Fig. 4 shows the result of mapping the rule "r: F1[1,7]F2 [2,6]→accept." to the two-dimensional matrix space M2, at this time, M2 contains a cell space, expressed as [(1,2)(7,5)].…”
Section: B Mpfpc Algorithmmentioning
confidence: 99%
“…Six cell spaces (cs1~cs6) in the two-dimensional matrix space form four coordinate projection intervals {[2,3], [4,4], [5,7], [8,9]} on the F1 dimension. The root node {a} of the sub-tree T1 corresponds to the interval [2,3], and all the associated cell spaces cs1 and cs5 form two coordinate projection intervals [2,3] and [7,8] in the F2 dimension. Two projection intervals are respectively added to the subtree T1 as the child nodes {e, f } of the root node {a}.…”
Section: Algorithm 1 Constructing Classification Decision Treementioning
confidence: 99%
See 1 more Smart Citation
“…The soft errors cause bit-flip errors that makes the data in the network corrupted. Moreover, some hardware applications of soft error tolerant TCAMs using SRAM and GPU are presented in [6] and [7], respectively. This work is based on partial don't care keys used for detecting bit-flip errors.…”
Section: Figure 1 Soft Error In Tcammentioning
confidence: 99%
“…Because the reduced dependence of data and control makes them more appropriate for the parallelism on multi-core and many-core systems. Many researchers have attempted to use GPUs to solve computing intensive problems in related domains [13][14][15][16][17][18][19][20][21][22][23][24][25]. Similarly, each filter is independent while executing conflict detection, and the field content matching does not require complex computations.…”
Section: Introductionmentioning
confidence: 99%