Optimal Semijoins for Distributed Database Systems
IEEE Transactions on Software Engineering
Summary cache: a scalable wide-area web cache sharing protocol
IEEE/ACM Transactions on Networking (TON)
Designing a Bloom filter for differential file access
Communications of the ACM
Reprogrammable network packet processing on the field programmable port extender (FPX)
FPGA '01 Proceedings of the 2001 ACM/SIGDA ninth international symposium on Field programmable gate arrays
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
Sharing Presence Information and Message Notification in an Ad Hoc Network
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
The Bloomier filter: an efficient data structure for static support lookup tables
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
Implementation Results of Bloom Filters for String Matching
FCCM '04 Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
Payload attribution via hierarchical bloom filters
Proceedings of the 11th ACM conference on Computer and communications security
SPIE-IPv6: Single IPv6 Packet Traceback
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
A Low Power Lookup Technique for Multi-Hashing Network Applications
ISVLSI '06 Proceedings of the IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and Architectures
CAPTRA: coordinated packet traceback
Proceedings of the 5th international conference on Information processing in sensor networks
Enhancing Collaborative Spam Detection with Bloom Filters
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Longest prefix matching using bloom filters
IEEE/ACM Transactions on Networking (TON)
Information Processing Letters
An improved construction for counting bloom filters
ESA'06 Proceedings of the 14th conference on Annual European Symposium - Volume 14
Towards Stateless Single-Packet IP Traceback
LCN '07 Proceedings of the 32nd IEEE Conference on Local Computer Networks
Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs
CIT '07 Proceedings of the 7th IEEE International Conference on Computer and Information Technology
A Fault-Tolerant Bloom Filter for Deep Packet Inspection
PRDC '07 Proceedings of the 13th Pacific Rim International Symposium on Dependable Computing
A Secure High-Speed Identification Scheme for RFID Using Bloom Filters
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
LOFT: Low-Overhead Freshness Transmission in Sensor Networks
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
IP Traceback Methodology Using Markov Chain and Bloom Filter in 802.16e
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
Detecting SYN Flooding Agents under Any Type of IP Spoofing
ICEBE '08 Proceedings of the 2008 IEEE International Conference on e-Business Engineering
A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
A Fast Bloom Filters Method in APN Filtering
PACIIA '08 Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02
A Parallel Method in the 3G Firewall
CMC '09 Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
Memory Efficient Parallel Bloom Filters for String Matching
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01
Replay Protection at the Link Layer Security in Wireless Sensor Networks
CSIE '09 Proceedings of the 2009 WRI World Congress on Computer Science and Information Engineering - Volume 01
A Multi-user DoS-Containment Broadcast Authentication Scheme for Wireless Sensor Networks
ITCS '09 Proceedings of the 2009 International Conference on Information Technology and Computer Science - Volume 01
Research on DDoS Filtering Algorithm Based on Bloom Filter WhiteList
MMIT '08 Proceedings of the 2008 International Conference on MultiMedia and Information Technology
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
IEEE Transactions on Mobile Computing
Personalized Filtering of Polymorphic E-mail Spam
SECURWARE '09 Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
Application of Bloom Filter for GTP Stateful Inspection in Network Processor
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 02
More Accurate and Fast SYN Flood Detection
ICCCN '09 Proceedings of the 2009 Proceedings of 18th International Conference on Computer Communications and Networks
Counting bloom filters for pattern matching and anti- evasion at the wire speed
IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection
Enhancing Dynamic Packet Filtering Technique with d-Left Counting Bloom Filter Algorithm
ICINIS '09 Proceedings of the 2009 Second International Conference on Intelligent Networks and Intelligent Systems
Security management with scalable distributed IP traceback
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A strategy of node membership verification for wireless multimedia sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Traceback-based Bloomfilter IPS in defending SYN flooding attack
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Self-Routing Denial-of-Service Resistant Capabilities Using In-packet Bloom Filters
EC2ND '09 Proceedings of the 2009 European Conference on Computer Network Defense
An efficient source authentication scheme in wireless sensor networks
AICCSA '10 Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010
Speed Up Statistical Spam Filter by Approximation
IEEE Transactions on Computers
Efficient packet filtering in wireless ad hoc networks
IEEE Communications Magazine
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
IEEE Journal on Selected Areas in Communications
Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks
ICNP '09 Proceedings of the 2009 17th IEEE International Conference on Network Protocols. ICNP 2009
Hi-index | 0.00 |
Undoubtedly, dealing with security issues is one of the most important and complex tasks various networks face today. A large number of security algorithms have been proposed to enhance security in various types of networks. Many of these solutions are either directly or indirectly based on Bloom filter (BF), a space- and time-efficient probabilistic data structure introduced by Burton Bloom in 1970. Obviously, Bloom filters and their variants are getting more and more consideration in network security area. This paper provides an up-to-date survey of the application of BFs and their variants to improve performance of the approaches proposed to address security problems with different types of networks.