Review Article

Distributed Controller Placement in Software-Defined Networks with Consistency and Interoperability Problems

Table 10

Comparison of related works on dmCP security.

ReferenceAttack typeMetricsProblem formulationSolution approach
SniffingByzantineDDoSOtherFailure rateThroughputLatencyNo of CLCompromisedLoss

[186]CryptographyAKA
[187]Byzantine, bin packingVMs based IaaS
[149]ILPHeuristics
[123]LP, RR consensusByzantine principles
[122]SM3D-EMD
[188]ILPHeuristics
[10]Knapsack K-means, GAHCP