Computer Science ›› 2013, Vol. 40 ›› Issue (9): 73-77.

Previous Articles     Next Articles

NetFlow Based on Parallel Single Multi-linked Lists

YE Di-qiu,CHENG Dong-nian and LI Yu-feng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In the high speed network,the bottleneck of NetFlow is the memory access.The efficiency of traditional list item operation "read-process-write" mode is only 36%,and the important factors which restrict the efficiency are read and write conversion as well as read and write delay.To solve this problem,continuous reading and writing method was proposed. It makes the efficiency of traditional list item operation increase to 90% or more by merging multi-delay and multiplexing read and write conversion.We proposed the parallel single multi-linked list method to handle with the inactive timeout flows.Continuous reading and writing method is applied to deal with the inactivity timeout flow through multiple list alternating operation.Theoretical analysis and experimental results show that the parallel single multi-linked list method can be applied in the link OC-768(40Gbps)to manage tens of millions of list items,which is significantly superior to the management ability of auxiliary storage method and doubly linked list method in the link OC-192(10Gbps)to manage millions of list items.

Key words: NetFlow,Parallel single multi-linked lists,Inactivity timeout flow

[1] 亓亚烜.多域网包分类算法研究[D].北京:清华大学,2011
[2] Nam G,Patankar P,Kesidis G,et al.Mass Purging of Stale TCP Flows in Per-flow Monitoring Systems[C]∥Computer Communications and Networks,ICCCN 2009,Proceedings of 18th Internatonal Conference on Date of Conference.2009:1-6
[3] Estan C,Keys K,Moore D,et al.Building a Better NetFlow[C]∥Proceedings of the 2004conference on Applications,technologies,architectures,and protocols for computer communications,SIGCOMM’04.2004:245-256
[4] Sadre R.The effects of DDoS attacks on flow monitoring applications [C]∥Network Operations and Management Symposium(NOMS).IEEE,2012:269-277
[5] Yoon S,Kim B,Oh J,et al.Session Management Architecturefor Implementing an FPGA-based Stateful Intrusion Detection System[C]∥Proceedings of the 8th WSEAS International Conference on Applied Computer Science(ACS’08).2008:31-36
[6] Kumar P R,Deepamala N.Design for implementing NetFlow u-sing existing session tables in devices like stateful inspection firewalls and Load balancers.2010:210-213
[7] Tsai W-Y,Huang Nen-fu,Hung H-W.A Lock-Controlled Session Table Partitioning Scheme with Dynamic Resource Balancing for Multi-Core Architecture[C]∥IEEE International Conference on Communications(ICC).2011:1-5
[8] Nam G,Patankar P,Lim S-H,et al.Clock-like Flow Replace-ment Schemes for Resilient Flow Monitoring[C]∥29th IEEE International Conference on Distributed Computing Systems,ICDCS’09.2009:129-136
[9] Koch R.Towards Next-Generation Intrusion Detection [C]∥3rd International Conference on Cyber Conflict(ICCC).2011:62-69
[10] Kanizo Y,Hay D,Keslassy I.Optimal Fast Hashing[C]∥Publication in the IEEE INFOCOM 2009proceedings.2009
[11] 三星:DDR2SDRAM操作时序规范.www.SolidPDF.com.2012.5
[12] Yoon S,Kim B,Oh J.High-Performance Stateful Intrusion Detection System[C]∥International Conference on Computational Intelligence and Security.2006:574-579
[13] Sekar V,Reiter M K,Willinger W,et al.cSamp:A system for networkwide flow monitoring[C]∥Proc.5th USENIX NSDI.2008
[14] Duffield N,Lund C,Thorup M.Estimating flow distributionsfrom sampled flow statistics[C]∥Proc.ACM SIGCOMM.2003:325-336
[15] MAWI:WIDE traffic archive.http://tracer.csl.sony.co.jp/

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!