Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications 2006
DOI: 10.1109/infocom.2006.203
|View full text |Cite
|
Sign up to set email alerts
|

Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(35 citation statements)
references
References 15 publications
0
35
0
Order By: Relevance
“…The following parameters are chosen based on systematic study as in [20,42]. We adopt 6 stages for each RS and OS, and 5 stages for each 2D sketch in our system.…”
Section: Evaluation Methodologymentioning
confidence: 99%
See 4 more Smart Citations
“…The following parameters are chosen based on systematic study as in [20,42]. We adopt 6 stages for each RS and OS, and 5 stages for each 2D sketch in our system.…”
Section: Evaluation Methodologymentioning
confidence: 99%
“…To meet the requirements above, we propose a new paradigm called DoS resilient High-speed Flow-level INtrusion Detection, HiFIND [18] leveraging recent work on data streaming computation and in particular, sketches [19,20]. Sketches are a kind of compact data streaming data structure which record traffic for given keys and are capable of reporting heavy traffic keys.…”
Section: Fifth Separating Anomalies From Intrusions For False Positimentioning
confidence: 99%
See 3 more Smart Citations