Research Article

Validating User Flows to Protect Software Defined Network Environments

Table 2

Limitations and problems of the state-of-the-art approaches.

State-of-the-artProblemsLimitations

Peer support strategy(i) Peer topology
(ii) Attacks target specific locations
(i) Peer support strategy is less effective
(ii) Single controller

Multiqueue SDN controller scheduling algorithm(i) Separate queues for each switch
(ii) Requires effective maintenance system
(i) Single controller
(ii) Complex to manage requests from switches