Research Article

Network Programming and Probabilistic Sketching for Securing the Data Plane

Figure 10

Convergence time required by VISKA to detect the malicious switches in the FatTree network topology.