[1]强士卿,程光.基于流的哈希函数比较分析研究[J].南京师范大学学报(工程技术版),2008,08(04):025-28.
 Qiang Shiqing,Cheng Guang.Comparison and Analysis of Hash Algorithm Based on Flows[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):025-28.
点击复制

基于流的哈希函数比较分析研究
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
08卷
期数:
2008年04期
页码:
025-28
栏目:
出版日期:
2008-12-30

文章信息/Info

Title:
Comparison and Analysis of Hash Algorithm Based on Flows
作者:
强士卿1;程光2
1. 东南大学计算机科学与工程学院, 江苏南京210096; 2. 东南大学江苏省计算机网络重点实验室, 江苏南京210096
Author(s):
Qiang Shiqing1Cheng Guang2
1.School of Computer Science and Engineering,Southeast University,Nanjing 210096,China;2.Jiangsu Provincial Key Laboratory of Computer Network Technology,Southeast University,Nanjing 210096,China
关键词:
流哈希函数 报文哈希函数 均匀性 冲突率
Keywords:
flow hash packet hash un ifo rm ity co llision ra te
分类号:
TP393.08
摘要:
为了缓解高速网络测量与硬件资源之间的矛盾,需要对网络流进行抽样处理,基于哈希的流抽样技术的广泛应用,流哈希函数性能是整个测量系统的核心.高速网络测量中对于哈希函数的研究主要集中在报文哈希函数性能方面,目前还未对现有的流哈希函数的性能进行分析比较研究.从理论分析和实验验证的角度出发,提出了几种流哈希函数的性能测度,并使用CERNET主干流量比较验证了一些通用的流哈希函数的均匀性、冲突率等性能测度,为流哈希函数的选择与使用提供依据.
Abstract:
In orde r to re lax the contradiction betw een the high- speed ne tw ork measurem ent and the hardware resou rces it is necessary to make a sam pling trea tm ent w ith ne tw ork flow. The em erg ing techn iques based on hash-samp ling have been w ide ly used, and the perform ance o f flow hash a lgor ithm is one o f the key m easuring technolog ies. The study o f hash in h igh-speed ne tw ork m easu rem ent w as m ainly concentrated on the perform ance o f the packet hash function, yet there haven’ t been the ana lysis and comparative study fo r the perform ance of the ex isting flow hash. From the theoretical analysis and experim ental verification point, th is paper pu ts forward severa l pe rform ance estim ations of flow hash, and uses the CERNET backbone tra ffic to m ake comparative study in un iform ity and low co llision ra te of genera l flow hash, and thus prov ides a foundation fo r se lecting flow hash.

参考文献/References:

[ 1] M o linaM, N icco lini S, Du ffie ld N G. A com para tive expe rim ental study o f hash functions applied to packe t samp ling [ C ] / /Interna tiona l Teletra ffic Congress( ITC- 19). Be ijing: 2005.
[ 2] M o linaM, Tartare lli S, Raspa llm F, et a.l Imp lementation o f an IPFIX com pliant flow trafficm ete r: cha llenges and pe rfo rmance assessm ent[ C] / / IEEEW orkshop on IP Operations andM anagem ent, 2003: 61-67.
[ 3] 程光, 龚俭, 丁伟, 等. 面向IP流测量的哈希算法研究[ J]. 软件学报, 2005, 16( 5): 652-658.
Cheng Guang, Gong Jian, D ingW e,i et a.l A hash a lgo rithm for IP flow m easurem ent[ J] . Journa l of So ftw are, 2005, 16( 5): 652-658. ( in Ch inese)
[ 4] W hang K, Vander Zanden B, Taylor H. A L inear- tim e probabilistic counting a lgo rithm for database applica tions[ J]. ACM Trans on Da tabase System s, 1990, 15( 2): 208-229.
[ 5] Zseby T, M olinaM, Raspa ll F, et a.l Sam pling and filte ring techn iques fo r IP packet selection[ EB /OL] . IETF 2004: 32-33.http: / / too ls. iet.f org /htm l/draft- ie tf- psam p- samp le- tech- 05# section- 17.
[ 6] Jenkins B. A lgor ithm A lley, Dr. Dobb’ s Journa,l September 1997[ J /OL]. http: / /burtleburtle. net/bob /hash /doobs. html.

备注/Memo

备注/Memo:
基金项目:国家“973”计划(2003cb314804);东南大学优秀青年教师项目;广东省计算机网络重点实验室开放研究(CCNL200706)资助项目
通讯联系人: 程 光, 博士, 副教授, 研究方向: 网络测量、网络行为学、网络安全等. E-ma il:gcheng@ n jn et. edu. cn
更新日期/Last Update: 2013-04-24