Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1368436.1368454acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives

Published: 04 December 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this paper, we introduce the retouched Bloom filter (RBF), an extension that makes the Bloom filter more flexible by permitting the removal of selected false positives at the expense of generating random false negatives. We analytically show that RBFs created through a random process maintain an overall error rate, expressed as a combination of the false positive rate and the false negative rate, that is equal to the false positive rate of the corresponding Bloom filters. We further provide some simple heuristics that decrease the false positive rate more than than the corresponding increase in the false negative rate, when creating RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a distributed network topology measurement application, where information about large stop sets must be shared among route tracing monitors.

    References

    [1]
    B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422--426, 1970.
    [2]
    M. Mitzenmacher, "Compressed Bloom filters," IEEE/ACM Trans. on Networking, vol. 10, no. 5, 2002.
    [3]
    A. Broder and M. Mitzenmacher, "Network applications of Bloom filters: A survey," Internet Mathematics, vol. 1, no. 4, 2002.
    [4]
    F. Bonomi, M. Mitzenmacher, R. Panigraphy, S. Singh, and G. Varghese, "Beyond Bloom filters: From approximate membership checks to approximate state machines," in Proc. ACM SIGCOMM, Sept. 2006.
    [5]
    L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: a scalable wide-area Web cache sharing protocol," IEEE/ACM Trans. on Networking, vol. 8, no. 3, pp. 281--293, 2000.
    [6]
    B. Donnet, B. Baynat, and T. Friedman, "Retouched Bloom filters: Allowing networked applications to trade off selected false positives against false negatives," arXiv, cs.NI 0607038, Jul. 2006.
    [7]
    M. Matsumoto and T. Nishimura, "Mersenne Twister: A 623-dimensionally equidistributed uniform pseudorandom number generator," ACM Trans. on Modeling and Computer Simulation, vol. 8, no. 1, pp. 3--30, Jan. 1998.
    [8]
    B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing," in Proc. SAINT, Jan. 2002.
    [9]
    Y. Shavitt and E. Shir, "DIMES: Let the internet measure itself," ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, 2005.
    [10]
    B. Donnet, P. Raoult, T. Friedman, and M. Crovella, "Efficient algorithms for large-scale topology discovery," in Proc. ACM SIGMETRICS, 2005.
    [11]
    L. Dall'Asta, I. Alvarez-Hamelin, A. Barrat, A. Vásquez, and A. Vespignani, "A statistical approach to the traceroute-like exploration of networks: Theory and simulations," in Proc. CAAN Workshop, Aug. 2004.
    [12]
    B. Donnet, T. Friedman, and M. Crovella, "Improved algorithms for network topology discovery," in Proc. PAM Workshop, 2005.
    [13]
    N. Hardy, "A little Bloom filter theory (and a bag of filter tricks)," 1999, see http://www.cap-lore.com/code/BloomTheory.html.
    [14]
    R. P. Laufer, P. B. Velloso, and O. C. M. B. Duarte, "Generalized Bloom filters," Electrical Engineering Program, COPPE/UFRJ, Tech. Rep. GTA-05-43, Sept. 2005.
    [15]
    R. P. Laufer, P. B. Velloso, D. de O. Cunha, I. M. Moraes, M. D. D. Bicudo, and O. C. M. B. Duarte, "A new IP traceback system against distributed denial-of-service attacks," in Proc. 12th ICT, 2005.
    [16]
    F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese, "An improved construction for counting Bloom filters," in Proc. ESA, Sept. 2006.

    Cited By

    View all
    • (2024)Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)Proceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36560058:2(1-34)Online publication date: 29-May-2024
    • (2024)GRF: A Global Range Filter for LSM-Trees with Shape EncodingProceedings of the ACM on Management of Data10.1145/36549442:3(1-27)Online publication date: 30-May-2024
    • (2024)Modeling Average False Positive Rates of Recycling Bloom FiltersIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621226(1970-1979)Online publication date: 20-May-2024
    • Show More Cited By

    Index Terms

    1. Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          CoNEXT '06: Proceedings of the 2006 ACM CoNEXT conference
          December 2006
          318 pages
          ISBN:1595934561
          DOI:10.1145/1368436
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 04 December 2006

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. bit clearing
          2. bloom filters
          3. false negatives
          4. false positives
          5. measurement
          6. traceroute

          Qualifiers

          • Research-article

          Acceptance Rates

          Overall Acceptance Rate 198 of 789 submissions, 25%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)12
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 11 Aug 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)Proceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36560058:2(1-34)Online publication date: 29-May-2024
          • (2024)GRF: A Global Range Filter for LSM-Trees with Shape EncodingProceedings of the ACM on Management of Data10.1145/36549442:3(1-27)Online publication date: 30-May-2024
          • (2024)Modeling Average False Positive Rates of Recycling Bloom FiltersIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621226(1970-1979)Online publication date: 20-May-2024
          • (2023)Securing Fieldable Bioinformatics2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)10.1109/BIBM58861.2023.10385290(3390-3397)Online publication date: 5-Dec-2023
          • (2022)Adaptive One Memory Access Bloom FiltersIEEE Transactions on Network and Service Management10.1109/TNSM.2022.314543619:2(848-859)Online publication date: Jun-2022
          • (2022)An Analysis of the Hardware-Friendliness of AMQ Data Structures for Network SecuritySecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-031-22829-2_16(287-313)Online publication date: 7-Dec-2022
          • (2021)Analyzing and Assessing Pollution Attacks on Bloom Filters: Some Filters are More Vulnerable than Others2021 17th International Conference on Network and Service Management (CNSM)10.23919/CNSM52442.2021.9615566(491-499)Online publication date: 25-Oct-2021
          • (2021)Stacked filtersProceedings of the VLDB Endowment10.14778/3436905.343691914:4(600-612)Online publication date: 22-Feb-2021
          • (2021)Perfect cuckoo filtersProceedings of the 17th International Conference on emerging Networking EXperiments and Technologies10.1145/3485983.3494852(205-211)Online publication date: 2-Dec-2021
          • (2021)Avoiding Flow Size Overestimation in Count-Min Sketch With Bloom Filter ConstructionsIEEE Transactions on Network and Service Management10.1109/TNSM.2021.306860418:3(3662-3676)Online publication date: Sep-2021
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media