Research Article
Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model
Table 4
Collection of comparison results of TE values for controllers.
| TE value | POX | ODL | Floodlight | Ryu 1.0 | Ryu 2.0 | Ryu 3.0 | Ryu 4.0 |
| Entry point | 15.29 | 12.27 | 14.09 | 16.08 | 8.54 | 8.01 | 8.14 | Exit point | 22.81 | 11.95 | 16.88 | 14.63 | 9.71 | 9.45 | 9.37 | Protocol interface | 9.66 | 17.64 | 14.34 | 17.15 | 6.95 | 7.32 | 7.51 | Data resource | 18.38 | 9.61 | 10.57 | 8.99 | 4.19 | 3.85 | 4.06 | Vulnerability set | 66.14 | 51.47 | 55.88 | 56.85 | 29.39 | 28.63 | 29.08 |
|
|