Review of Variants of Bloom Filters for Detection of Malicious URL
Keywords:
Congestion, Game theory, MANETs, Network traffic, RoutingAbstract
The proliferation of malicious URLs poses a significant cybersecurity threat, necessitating the development of effective detection methods. Bloom filters, a probabilistic data structure, have been widely used for URL detection due to their efficiency in set membership testing. However, traditional Bloom filters suffer from limitations such as false positives, false negatives, and the inability to dynamically update entries. To address these challenges, various variants of Bloom filters have been proposed for detecting malicious URLs. This review explores the merits and demerits of different Bloom filter variants, including Counting Bloom Filter (CBF), Count-Min Sketch (CMS), Stable Bloom Filter (SBF), Scalable Bloom Filter (SBF), Cuckoo Filter, Bloomier Filter, and Bloom Filter Tree (BFT). Evaluation of these variants based on empirical studies and real-world applications reveals their performance, scalability, and accuracy in URL detection tasks. Challenges and open research questions in the field of URL detection using Bloom filter variants are identified, including handling dynamic threats, reducing false positives and false negatives, optimizing performance in real-time systems, and addressing privacy and security concerns. Potential future directions for improving Bloom filter-based URL detection methods are discussed, such as hybrid approaches, dynamic Bloom filters, probabilistic data structures, privacy-preserving techniques, standardization, benchmarking, and real-world deployment and evaluation.