Research Article

Network Programming and Probabilistic Sketching for Securing the Data Plane

Figure 9

Average number of recursive steps required to detect the malicious switches in the FatTree network topology.