Network Programming and Probabilistic Sketching for Securing the Data Plane
Table 5
VISKA complexity analysis summary of the MACM attack categorization module.
Term
Meaning
Value
The cost of the MACM attack categorization module as a function of the number of egress packets and the number of ingress packets .
Cost of + Cost of
Cost of
Represents the cost of data collection and applying the hash operation on the destination IP and source IP addresses of each egress and ingress packet.
Cost_
The worst case runtime cost of detecting the different types of DoS, Interruption/Blocking, and MITM attacks.
Adding the costs of phases 1, 2, and 3 and simplifying the complexity terms, we get the worst case runtime cost of the MACM module to be in the order of .