Research Article

Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

Table 4

Collection of comparison results of TE values for controllers.

TE valuePOXODLFloodlightRyu 1.0Ryu 2.0Ryu 3.0Ryu 4.0

Entry point15.2912.2714.0916.088.548.018.14
Exit point22.8111.9516.8814.639.719.459.37
Protocol interface9.6617.6414.3417.156.957.327.51
Data resource18.389.6110.578.994.193.854.06
Vulnerability set66.1451.4755.8856.8529.3928.6329.08