Research Article
Validating User Flows to Protect Software Defined Network Environments
Table 2
Limitations and problems of the state-of-the-art approaches.
| State-of-the-art | Problems | Limitations |
| Peer support strategy | (i) Peer topology (ii) Attacks target specific locations | (i) Peer support strategy is less effective (ii) Single controller |
| Multiqueue SDN controller scheduling algorithm | (i) Separate queues for each switch (ii) Requires effective maintenance system | (i) Single controller (ii) Complex to manage requests from switches |
|
|