Review Article
Distributed Controller Placement in Software-Defined Networks with Consistency and Interoperability Problems
Table 10
Comparison of related works on dmCP security.
| Reference | Attack type | Metrics | Problem formulation | Solution approach | Sniffing | Byzantine | DDoS | Other | Failure rate | Throughput | Latency | No of CL | Compromised | Loss |
| [186] | √ | | — | √ | — | √ | — | — | — | — | Cryptography | AKA | [187] | — | √ | — | — | — | — | √ | √ | √ | — | Byzantine, bin packing | VMs based IaaS | [149] | — | √ | — | — | √ | — | √ | √ | — | √ | ILP | Heuristics | [123] | — | √ | — | — | — | — | — | — | — | — | LP, RR consensus | Byzantine principles | [122] | — | — | √ | — | — | — | — | — | — | — | SM | 3D-EMD | [188] | — | √ | — | — | √ | — | √ | √ | — | √ | ILP | Heuristics | [10] | — | — | — | √ | √ | — | √ | — | — | — | Knapsack K-means, GA | HCP |
|
|