Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1368436.1368454acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives

Published: 04 December 2006 Publication History

Abstract

Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this paper, we introduce the retouched Bloom filter (RBF), an extension that makes the Bloom filter more flexible by permitting the removal of selected false positives at the expense of generating random false negatives. We analytically show that RBFs created through a random process maintain an overall error rate, expressed as a combination of the false positive rate and the false negative rate, that is equal to the false positive rate of the corresponding Bloom filters. We further provide some simple heuristics that decrease the false positive rate more than than the corresponding increase in the false negative rate, when creating RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a distributed network topology measurement application, where information about large stop sets must be shared among route tracing monitors.

References

[1]
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422--426, 1970.
[2]
M. Mitzenmacher, "Compressed Bloom filters," IEEE/ACM Trans. on Networking, vol. 10, no. 5, 2002.
[3]
A. Broder and M. Mitzenmacher, "Network applications of Bloom filters: A survey," Internet Mathematics, vol. 1, no. 4, 2002.
[4]
F. Bonomi, M. Mitzenmacher, R. Panigraphy, S. Singh, and G. Varghese, "Beyond Bloom filters: From approximate membership checks to approximate state machines," in Proc. ACM SIGCOMM, Sept. 2006.
[5]
L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: a scalable wide-area Web cache sharing protocol," IEEE/ACM Trans. on Networking, vol. 8, no. 3, pp. 281--293, 2000.
[6]
B. Donnet, B. Baynat, and T. Friedman, "Retouched Bloom filters: Allowing networked applications to trade off selected false positives against false negatives," arXiv, cs.NI 0607038, Jul. 2006.
[7]
M. Matsumoto and T. Nishimura, "Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator," ACM Trans. on Modeling and Computer Simulation, vol. 8, no. 1, pp. 3--30, Jan. 1998.
[8]
B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing," in Proc. SAINT, Jan. 2002.
[9]
Y. Shavitt and E. Shir, "DIMES: Let the internet measure itself," ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, 2005.
[10]
B. Donnet, P. Raoult, T. Friedman, and M. Crovella, "Efficient algorithms for large-scale topology discovery," in Proc. ACM SIGMETRICS, 2005.
[11]
L. Dall'Asta, I. Alvarez-Hamelin, A. Barrat, A. Vásquez, and A. Vespignani, "A statistical approach to the traceroute-like exploration of networks: Theory and simulations," in Proc. CAAN Workshop, Aug. 2004.
[12]
B. Donnet, T. Friedman, and M. Crovella, "Improved algorithms for network topology discovery," in Proc. PAM Workshop, 2005.
[13]
N. Hardy, "A little Bloom filter theory (and a bag of filter tricks)," 1999, see http://www.cap-lore.com/code/BloomTheory.html.
[14]
R. P. Laufer, P. B. Velloso, and O. C. M. B. Duarte, "Generalized Bloom filters," Electrical Engineering Program, COPPE/UFRJ, Tech. Rep. GTA-05-43, Sept. 2005.
[15]
R. P. Laufer, P. B. Velloso, D. de O. Cunha, I. M. Moraes, M. D. D. Bicudo, and O. C. M. B. Duarte, "A new IP traceback system against distributed denial-of-service attacks," in Proc. 12th ICT, 2005.
[16]
F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese, "An improved construction for counting Bloom filters," in Proc. ESA, Sept. 2006.

Cited By

View all
  • (2024)Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)Proceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36560058:2(1-34)Online publication date: 29-May-2024
  • (2024)GRF: A Global Range Filter for LSM-Trees with Shape EncodingProceedings of the ACM on Management of Data10.1145/36549442:3(1-27)Online publication date: 30-May-2024
  • (2024)Modeling Average False Positive Rates of Recycling Bloom FiltersIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621226(1970-1979)Online publication date: 20-May-2024
  • Show More Cited By

Index Terms

  1. Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CoNEXT '06: Proceedings of the 2006 ACM CoNEXT conference
        December 2006
        318 pages
        ISBN:1595934561
        DOI:10.1145/1368436
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 04 December 2006

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. bit clearing
        2. bloom filters
        3. false negatives
        4. false positives
        5. measurement
        6. traceroute

        Qualifiers

        • Research-article

        Acceptance Rates

        Overall Acceptance Rate 198 of 789 submissions, 25%

        Upcoming Conference

        CoNEXT '24

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)14
        • Downloads (Last 6 weeks)5
        Reflects downloads up to 12 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)Proceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36560058:2(1-34)Online publication date: 29-May-2024
        • (2024)GRF: A Global Range Filter for LSM-Trees with Shape EncodingProceedings of the ACM on Management of Data10.1145/36549442:3(1-27)Online publication date: 30-May-2024
        • (2024)Modeling Average False Positive Rates of Recycling Bloom FiltersIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621226(1970-1979)Online publication date: 20-May-2024
        • (2023)Securing Fieldable Bioinformatics2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)10.1109/BIBM58861.2023.10385290(3390-3397)Online publication date: 5-Dec-2023
        • (2022)Adaptive One Memory Access Bloom FiltersIEEE Transactions on Network and Service Management10.1109/TNSM.2022.314543619:2(848-859)Online publication date: Jun-2022
        • (2022)An Analysis of the Hardware-Friendliness of AMQ Data Structures for Network SecuritySecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-031-22829-2_16(287-313)Online publication date: 7-Dec-2022
        • (2021)Analyzing and Assessing Pollution Attacks on Bloom Filters: Some Filters are More Vulnerable than Others2021 17th International Conference on Network and Service Management (CNSM)10.23919/CNSM52442.2021.9615566(491-499)Online publication date: 25-Oct-2021
        • (2021)Stacked filtersProceedings of the VLDB Endowment10.14778/3436905.343691914:4(600-612)Online publication date: 22-Feb-2021
        • (2021)Perfect cuckoo filtersProceedings of the 17th International Conference on emerging Networking EXperiments and Technologies10.1145/3485983.3494852(205-211)Online publication date: 2-Dec-2021
        • (2021)Avoiding Flow Size Overestimation in Count-Min Sketch With Bloom Filter ConstructionsIEEE Transactions on Network and Service Management10.1109/TNSM.2021.306860418:3(3662-3676)Online publication date: Sep-2021
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media