• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Xiaohuan, Xia Jingbo, Fu Kai, Li Minghui. Frequent Items Mining Algorithm over Network Flows at High-Speed Network[J]. Journal of Computer Research and Development, 2014, 51(11): 2458-2469. DOI: 10.7544/issn1000-1239.2014.20130798
Citation: Zhao Xiaohuan, Xia Jingbo, Fu Kai, Li Minghui. Frequent Items Mining Algorithm over Network Flows at High-Speed Network[J]. Journal of Computer Research and Development, 2014, 51(11): 2458-2469. DOI: 10.7544/issn1000-1239.2014.20130798

Frequent Items Mining Algorithm over Network Flows at High-Speed Network

More Information
  • Published Date: October 31, 2014
  • With the bandwidth of backbone network link increasing geometrically, mining the frequent items over network flows promptly and accurately is important for network management and network security. Inspired by SS counting method, an integrated weighted frequent items mining algorithm IWFIM over network flows, whose pruning strategy is subject to the constraints of time and flow length, is proposed according to the property of flows. The weight of each flow item is endowed by time and flow length and the item with the minimum weight is deleted during the operation of pruning for IWFIM. Then, based on IWFIM, another frequent items mining algorithm CBF_IWFIM with the capability of combining the advantages of hashing method and counting method is proposed according to the property of heavy-tailed distribution of flows. The improved counting Blooming filter is used to filter the majority of small flows without saving flows’ information and IWFIM is introduced to identify the frequent items afterwards for CBF_IWFIM. The experiments over real network traffic show that CBF_IWFIM and IWFIM are very space-saving and precise, and they can achieve much more reasonable measurement accuracy than other three frequent items mining algorithms like SS. Even in the situation of consuming one-third of the space cost in other three algorithms, the two algorithms CBF_IWFIM and IWFIM still perform better than other three algorithms like SS.
  • Related Articles

    [1]He Yulin, Wu Bo, Wu Dingming, Huang Zhexue, Philippe Fournier-Viger. Edge Hashing Distributed Sampling Algorithm for Triangle Counting in Large-scale Dynamic Graph Stream[J]. Journal of Computer Research and Development, 2024, 61(8): 1882-1903. DOI: 10.7544/issn1000-1239.202440120
    [2]Ma Lanjihong, Zhao Peng, Zhou Zhihua. Robust Heavy-Tailed Linear Bandits Algorithm[J]. Journal of Computer Research and Development, 2023, 60(6): 1385-1395. DOI: 10.7544/issn1000-1239.202220279
    [3]Xu Ke, Li Yanbiao, Xie Gaogang, Zhang Dafang. Efficient Name Lookup Method Based on Hybrid Counting Bloom Filters[J]. Journal of Computer Research and Development, 2023, 60(5): 1136-1150. DOI: 10.7544/issn1000-1239.202111242
    [4]Cheng Yujia, Tao Wei, Liu Yuxiang, Tao Qing. Optimal Individual Convergence Rate of the Heavy-Ball-Based Momentum Methods[J]. Journal of Computer Research and Development, 2019, 56(8): 1686-1694. DOI: 10.7544/issn1000-1239.2019.20190167
    [5]Li Wei, Zhang Dafang, Xie Kun, Li Wenwei, He Jie. A Matrix-Indexed Bloom Filter for Flash-Based Key-Value Store[J]. Journal of Computer Research and Development, 2015, 52(5): 1210-1222. DOI: 10.7544/issn1000-1239.2015.20131940
    [6]Wang Ling, Liu Shanjun, Chen Binglin, Ji Changying. Heuristic Discrimination Cotton Ripeness Using Hybrid Filter and Wrapper[J]. Journal of Computer Research and Development, 2013, 50(2): 269-277.
    [7]Li Zhen, Yang Yahui, Xie Gaogang, Qin Guangcheng. An Identification Method Combining Data Streaming Counting with Probabilistic Fading for Heavy-Hitter Flows[J]. Journal of Computer Research and Development, 2011, 48(6): 1010-1017.
    [8]Dai Dongbo, Tang Chunlei, Qiu Boren, Xiong Yun, and Zhu Yangyong. An Algorithm for Sequence Similarity Query with Optimized Multiple Filtering[J]. Journal of Computer Research and Development, 2010, 47(10): 1785-1796.
    [9]Ren Jinping and Lü Shuwang. Enumerations and Counting of Orthomorphic Permutations[J]. Journal of Computer Research and Development, 2006, 43(6): 1071-1075.
    [10]Wang Li, Xu Mingwei, and Xu Ke. On the Deployment Approach of IPSec and IP Filter in Routers[J]. Journal of Computer Research and Development, 2006, 43(3): 375-380.

Catalog

    Article views (1486) PDF downloads (636) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return