COMPARATIVE STUDY OF BLOOM FILTER ARCHITECTURES

1
Dr. Ritu chhabra
Dr. Ritu chhabra
2
Dr.Vandana Nath
Dr.Vandana Nath
1 GGSIPU

Send Message

To: Author

GJRE Volume 12 Issue F4

Article Fingerprint

ReserarchID

8H356

COMPARATIVE STUDY OF BLOOM FILTER ARCHITECTURES Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Hardware based virus protection systems are required for identifying the malicious content and further removing it from network streams. Network Intrusion Detection System(NIDS) is needed to protect the end user machines from threats. An effective NIDS is therefore a network security system capable of protecting the end user machines well before a threat affects.NIDS requires a space efficient data base for detection of threats in high speed conditions. Bloom Filters are one of the security filters that consume significant power to detect and then filter out malicious content. A Bloom filter is a space efficient randomized data structure for representing a set in order to support membership queries. The aim of this paper is to compare the different architectures of Bloom filter like Standard Bloom filter, pipelined bloom filter, counting Bloom filter and parallel processing architecture of bloom filter in terms of their merits and demerits by using algorithmic & architectural techniques.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Dr. Ritu chhabra. 2012. \u201cCOMPARATIVE STUDY OF BLOOM FILTER ARCHITECTURES\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 12 (GJRE Volume 12 Issue F4): .

Download Citation

Article file ID not found.

Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Classification
Not Found
Version of record

v1.2

Issue date

April 3, 2012

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 5659
Total Downloads: 2717
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Hardware based virus protection systems are required for identifying the malicious content and further removing it from network streams. Network Intrusion Detection System(NIDS) is needed to protect the end user machines from threats. An effective NIDS is therefore a network security system capable of protecting the end user machines well before a threat affects.NIDS requires a space efficient data base for detection of threats in high speed conditions. Bloom Filters are one of the security filters that consume significant power to detect and then filter out malicious content. A Bloom filter is a space efficient randomized data structure for representing a set in order to support membership queries. The aim of this paper is to compare the different architectures of Bloom filter like Standard Bloom filter, pipelined bloom filter, counting Bloom filter and parallel processing architecture of bloom filter in terms of their merits and demerits by using algorithmic & architectural techniques.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

COMPARATIVE STUDY OF BLOOM FILTER ARCHITECTURES

Dr. Ritu chhabra
Dr. Ritu chhabra GGSIPU
Dr.Vandana Nath
Dr.Vandana Nath

Research Journals