Research Article

Validating User Flows to Protect Software Defined Network Environments

Table 3

Key parameters for our simulation.

ParametersValue

Number of controllers (OpenFlow)3
Number of switches8
Number of hosts (per switch)4
(Hosts) topologyStar topology
Flow table size8,000 entries
Buffer capacity10
Trust value100 (maximum)
Number of flows116
Average attack rate25 requests per seconds
Simulation time300 seconds
Flow timeout2 seconds