Reducing False Positives of a Bloom Filter using Cross-Checking Bloom Filters

A Bloom filter is a compact data structure that supports membership querie s on a set, allowing false positives. The simplicity and the excellent performance of a Bloom filter make it a standard data str ucture of great use in many network applications. In reducing the false positive rate of a Bloom filter, it is well known that the size of a Bloom filter and accordingly the number of hash indices should be increased. In this paper, we propose a new architecture reducing the false positive rate of a Bloom filter more efficiently. The proposed architecture uses cross-checking Bloom filters that are queried in case of positives of a main Bloom filter to cross-check the results. If every cross-checking Bloom filters produce negatives , the positive of the main Bloom filter can be determined as a false positive. The main Bloom filter is not necessarily large to reduce the false p ositive rate, since more numbers of the false positives of the main Bloom filter are identified by cross-checking Bloom filters. Simulation re sults show that the false positive of the proposed scheme converges to zero faster, while requiring the total memory size for Bloom filters smaller, than that of a single Bloom filter architecture.

[1]  Deokho Kim,et al.  Design of power-efficient parallel pipelined bloom filter , 2012 .

[2]  K. Yee Numerical solution of initial boundary value problems involving maxwell's equations in isotropic media , 1966 .

[3]  Hyesook Lim,et al.  Binary search on levels using a Bloom filter for IPv6 address lookup , 2009, ANCS '09.

[4]  Michael Mitzenmacher,et al.  Compressed bloom filters , 2001, PODC '01.

[5]  Rafael M. Gasca,et al.  Mesh Network Firewalling with Bloom Filters , 2007, 2007 IEEE International Conference on Communications.

[6]  Emre Telatar,et al.  Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..

[7]  Kamal Sarabandi,et al.  Antennas and Propagation , 2019, 2019 14th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[8]  Yi Lu,et al.  Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture , 2009, IEEE INFOCOM 2009.

[9]  Farzaneh Sadat Tabataba,et al.  Improving false positive in Bloom filter , 2011, 2011 19th Iranian Conference on Electrical Engineering.

[10]  Isaac Keslassy,et al.  The Bloom Paradox: When Not to Use a Bloom Filter , 2015, IEEE/ACM Transactions on Networking.

[11]  A. Kumar,et al.  Space-code bloom filter for efficient per-flow traffic measurement , 2004, IEEE INFOCOM 2004.

[12]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[13]  Hyesook Lim,et al.  On Adding Bloom Filters to Longest Prefix Matching Algorithms , 2014, IEEE Transactions on Computers.

[14]  John W. Lockwood,et al.  Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.

[15]  Walid A. Najjar,et al.  Automatic Compilation Framework for Bloom Filter Based Intrusion Detection , 2006, ARC.

[16]  Amin Vahdat,et al.  Efficient Peer-to-Peer Keyword Searching , 2003, Middleware.

[17]  So-Yeon Kim,et al.  Tuple Pruning Using Bloom Filters for Packet Classification , 2009, IEEE Micro.

[18]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.

[19]  Jorge Herbert de Lira,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[20]  Shigang Chen,et al.  One memory access bloom filters and their generalization , 2011, 2011 Proceedings IEEE INFOCOM.

[21]  Michael Mitzenmacher,et al.  Less Hashing, Same Performance: Building a Better Bloom Filter , 2006, ESA.

[22]  Michael Mitzenmacher,et al.  Less hashing, same performance: Building a better Bloom filter , 2006, Random Struct. Algorithms.

[23]  Fang Hao,et al.  IPv6 Lookups using Distributed and Load Balanced Bloom Filters for 100Gbps Core Router Line Cards , 2009, IEEE INFOCOM 2009.

[24]  Haoyu Song,et al.  Fast hash table lookup using extended bloom filter: an aid to network processing , 2005, SIGCOMM '05.

[25]  John W. Lockwood,et al.  Fast and Scalable Pattern Matching for Network Intrusion Detection Systems , 2006, IEEE Journal on Selected Areas in Communications.

[26]  W. Marsden I and J , 2012 .

[27]  Jae S. Lim,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[28]  Sarang Dharmapurikar,et al.  Longest prefix matching using bloom filters , 2006, IEEE/ACM Transactions on Networking.

[29]  Abhishek Kumar,et al.  Efficient and scalable query routing for unstructured peer-to-peer networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[30]  Kang Li,et al.  Approximate caches for packet classification , 2004, IEEE INFOCOM 2004.