Table 2 Notation symbol and explanation.

From: Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking

Notation symbol

Explanation

\(N\subseteq \{n_1, n_2,..., n_n \}\)

Nodes in physical topology

\(L\subseteq \textit{N} \times \textit{N}\)

Links between physical nodes

\(T_{in } \in \{n_1, n_2,..., n_n \}\)

Tunnel ingress

\(T_{e } \in \{n_1, n_2,..., n_n \}\)

Tunnel egress

\(\vec {T}\in \textit{T}_{in } \times \textit{T}_{e }\)

Tunnel vector from ingress to egress

\(P=(N, L)\)

Physical topology

\(N'\in \{\textit{T}_{in }, \textit{T}_{e } \}\)

Nodes in virtual topology

\(L'\subseteq \{\vec {T}\}\)

Virtual links created by tunnel

\(V=(N', L')\)

Virtual topology

\(F_{l }\)

Importance of link

H(P)

Topology entropy of the topology P

\(I_{l}\)

Importance ratio of link l

\(F_{avg}(P)\)

Importance average of links in topology P

\(F_{var}(P)\)

Importance variance of links in topology P

\({FR}_{avg}(P)\)

Rate of decline of importance average

\({FR}_{var}(P)\)

Rate of decline of importance variance

\(sim(P, V) \in [0, 1]\)

Similarity score between topology P and V

BC(n)

Betweenness Centrality, BC

CC(n)

Closeness Centrality, CC