su pe rse de d b y co nfe ren ce ve rsi on Attacking the Hash Table based Data Structures of Flow Monitors