Research Article

Network Programming and Probabilistic Sketching for Securing the Data Plane

Table 5

VISKA complexity analysis summary of the MACM attack categorization module.

TermMeaningValue

The cost of the MACM attack categorization module as a function of the number of egress packets and the number of ingress packets .Cost of + Cost of

Cost of Represents the cost of data collection and applying the hash operation on the destination IP and source IP addresses of each egress and ingress packet.

Cost_The worst case runtime cost of detecting the different types of DoS, Interruption/Blocking, and MITM attacks.

Adding the costs of phases 1, 2, and 3 and simplifying the complexity terms, we get the worst case runtime cost of the MACM module to be in the order of .=