{"id":"https://openalex.org/W2158156482","doi":"https://doi.org/10.1109/glocom.2008.ecp.391","title":"Highly Memory-Efficient LogLog Hash for Deep Packet Inspection","display_name":"Highly Memory-Efficient LogLog Hash for Deep Packet Inspection","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2158156482","doi":"https://doi.org/10.1109/glocom.2008.ecp.391","mag":"2158156482"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2008.ecp.391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004563986","display_name":"Masanori Bando","orcid":null},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]},{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Masanori Bando","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, USA","institution_ids":["https://openalex.org/I90965887","https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020722326","display_name":"N. Sertac Artan","orcid":"https://orcid.org/0000-0002-2335-0279"},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]},{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N. Sertac Artan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, USA","institution_ids":["https://openalex.org/I90965887","https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111696249","display_name":"H. Jonathan Chao","orcid":null},"institutions":[{"id":"https://openalex.org/I90965887","display_name":"SUNY Polytechnic Institute","ror":"https://ror.org/000fxgx19","country_code":"US","type":"education","lineage":["https://openalex.org/I90965887"]},{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"H. Jonathan Chao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, USA","institution_ids":["https://openalex.org/I90965887","https://openalex.org/I57206974"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.426,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":12,"citation_normalized_percentile":{"value":0.676919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep Packet Inspection","score":0.78506166},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.5196661}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8107568},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.78506166},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.750221},{"id":"https://openalex.org/C87431388","wikidata":"https://www.wikidata.org/wiki/Q2070573","display_name":"Perfect hash function","level":4,"score":0.65989953},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.57489944},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5295019},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.5196661},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.4914931},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46598783},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.44849443},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3993625},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.38976586},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34361678},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.22318274},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2008.ecp.391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.44}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1531610435","https://openalex.org/W1569514888","https://openalex.org/W1960511147","https://openalex.org/W2086923710","https://openalex.org/W2096145252","https://openalex.org/W2097150201","https://openalex.org/W2115025779","https://openalex.org/W2137959021","https://openalex.org/W2138756088","https://openalex.org/W2138768227","https://openalex.org/W2147228424","https://openalex.org/W2148310801","https://openalex.org/W2149375166","https://openalex.org/W2166975715","https://openalex.org/W2169660454","https://openalex.org/W2171050329","https://openalex.org/W2172264011"],"related_works":["https://openalex.org/W3145382147","https://openalex.org/W2734832476","https://openalex.org/W2362008364","https://openalex.org/W2359973492","https://openalex.org/W2129541134","https://openalex.org/W2115775347","https://openalex.org/W2069197195","https://openalex.org/W1694672787","https://openalex.org/W1606491530","https://openalex.org/W1497214516"],"abstract_inverted_index":{"Today's":[0],"network":[1],"line":[2],"rates":[3],"reach":[4,13],"speeds":[5,22],"of":[6,52],"40":[7],"Gbps":[8,15],"and":[9,32,46,77],"are":[10,81],"anticipated":[11],"to":[12,58,63,83,123,126,135],"100":[14],"in":[16,28,129],"the":[17,66,127,137],"near":[18],"future.":[19],"These":[20],"high":[21],"make":[23],"Deep":[24],"Packet":[25],"Inspection":[26],"(DPI)":[27],"Network":[29],"Intrusion":[30],"Detection":[31],"Prevention":[33],"Systems":[34],"(NIDPSs)":[35],"very":[36],"challenging.":[37],"The":[38,144],"DPI":[39,61],"examines":[40],"each":[41],"incoming":[42],"packet":[43],"byte-by-":[44],"byte":[45],"matches":[47],"them":[48],"against":[49],"a":[50,94,102,113,149],"set":[51],"predefined":[53],"malicious":[54],"signatures.":[55],"One":[56],"way":[57],"achieve":[59],"high-speed":[60,69],"is":[62,75,100],"store":[64],"all":[65],"signatures":[67],"on":[68],"on-chip":[70,73,86,130],"memory.":[71],"However,":[72],"memory":[74,87,131],"limited":[76],"space-efficient":[78],"data":[79,106],"structures":[80],"needed":[82],"leverage":[84],"precious":[85],"efficiently.":[88],"A":[89],"hash":[90],"table":[91],"addressed":[92],"by":[93],"Minimal":[95],"Perfect":[96],"Hash":[97],"Function":[98],"(MPHF)":[99],"such":[101],"high-speed,":[103],"space":[104],"efficient":[105],"structure.":[107],"In":[108],"this":[109],"paper,":[110],"we":[111],"describe":[112],"highly":[114],"memory-efficient":[115],"MPHF,":[116],"which":[117],"requires":[118],"3.5":[119],"bits":[120],"per":[121],"key":[122,128],"facilitate":[124],"access":[125],"while":[132],"allowing":[133],"us":[134],"perform":[136],"expensive":[138],"exact":[139],"match":[140],"operation":[141],"only":[142],"once.":[143],"proposed":[145],"MPHF":[146],"also":[147],"has":[148],"low":[150],"construction":[151],"time.":[152]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2158156482","counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2024-12-11T16:44:19.578503","created_date":"2016-06-24"}