Chapter 14: Network security using Bloom Filter

Abstract

Recent years have seen a drastic hike in transmission and storage of private data such as photos and documents in the cloud due to the development of social media sites. Furthermore, every field depends on network communication to remain connected to people throughout the world. This demands for the security of the data. However, the exponential increase of the data exchanged in the network leads to various network attacks. The security techniques have a long list of requirements to cover. One is handling high-speed incoming data packets received during network attacks. The data packets are bogus packets containing no information; however, the technique must process them to recognize legitimate ...

Get Bloom Filter now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.