Research Article

Validating User Flows to Protect Software Defined Network Environments

Figure 8

Holding time effectiveness under flow table overloading attack.