Deep packet inspection using Cuckoo filter
Title | Deep packet inspection using Cuckoo filter |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Al-hisnawi, M., Ahmadi, M. |
Conference Name | 2017 Annual Conference on New Trends in Information Communications Technology Applications (NTICT) |
Publisher | IEEE |
ISBN Number | 978-1-5386-2962-8 |
Keywords | Bloom filter, Cuckoo filter, data structures, deep packet inspection, filtering algorithms, Fingerprint recognition, high performance DPI approaches, Information filters, Inspection, Internet, Internet service providers, k hash functions, matched filters, matching check tool, membership query data structures, pubcrawl, Quotient Filter, resilience, Resiliency, Scalability, signature fingerprint, telecommunication traffic, Traffic classification, Traffic identification |
Abstract | Nowadays, Internet Service Providers (ISPs) have been depending on Deep Packet Inspection (DPI) approaches, which are the most precise techniques for traffic identification and classification. However, constructing high performance DPI approaches imposes a vigilant and an in-depth computing system design because the demands for the memory and processing power. Membership query data structures, specifically Bloom filter (BF), have been employed as a matching check tool in DPI approaches. It has been utilized to store signatures fingerprint in order to examine the presence of these signatures in the incoming network flow. The main issue that arise when employing Bloom filter in DPI approaches is the need to use k hash functions which, in turn, imposes more calculations overhead that degrade the performance. Consequently, in this paper, a new design and implementation for a DPI approach have been proposed. This DPI utilizes a membership query data structure called Cuckoo filter (CF) as a matching check tool. CF has many advantages over BF like: less memory consumption, less false positive rate, higher insert performance, higher lookup throughput, support delete operation. The achieved experiments show that the proposed approach offers better performance results than others that utilize Bloom filter. |
URL | https://ieeexplore.ieee.org/document/7976111 |
DOI | 10.1109/NTICT.2017.7976111 |
Citation Key | al-hisnawi_deep_2017 |
- matched filters
- Traffic identification
- Traffic classification
- telecommunication traffic
- signature fingerprint
- Scalability
- Resiliency
- resilience
- Quotient Filter
- pubcrawl
- membership query data structures
- matching check tool
- Bloom filter
- k hash functions
- Internet service providers
- internet
- Inspection
- Information filters
- high performance DPI approaches
- Fingerprint recognition
- filtering algorithms
- deep packet inspection
- data structures
- Cuckoo filter