New data structure allows rapid tracking and policing of network data.
To protect networks from malicious threats, cyber-security solutions must track all the data flowing through the network—just like security guards checking travellers in airports. However, it is hard to design a solution that works fast enough to process all the information in real time and to block threats before they can strike. Now, A*STAR researchers have designed a way to structure data that is robust against cyber-attacks and allows it to be processed in record time
The team's work improves on widely-used data structures called 'hash tables'. "A hash table maps values to specific locations, labelled with indices," explains Vrizlynn Thing from the A*STAR's Institute for Infocomm Research, who led the study. "To find a value, the hash table performs computations to quickly identify the indices and thus, its location. The challenges are that millions of values need to be stored, and the values are generated and transmitted extremely quickly."
The team's work improves on widely-used data structures called 'hash tables'. "A hash table maps values to specific locations, labelled with indices," explains Vrizlynn Thing from the A*STAR's Institute for Infocomm Research, who led the study. "To find a value, the hash table performs computations to quickly identify the indices and thus, its location. The challenges are that millions of values need to be stored, and the values are generated and transmitted extremely quickly."
Comments
Post a Comment