Evaluation And Application Of Bloom Filters In Computer Network Security