Research Article
Validating User Flows to Protect Software Defined Network Environments
Table 3
Key parameters for our simulation.
| Parameters | Value |
| Number of controllers (OpenFlow) | 3 | Number of switches | 8 | Number of hosts (per switch) | 4 | (Hosts) topology | Star topology | Flow table size | 8,000 entries | Buffer capacity | 10 | Trust value | 100 (maximum) | Number of flows | 116 | Average attack rate | 25 requests per seconds | Simulation time | 300 seconds | Flow timeout | 2 seconds |
|
|