Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Algorithm 1

FIFO inference algorithm.
Require:
Packet-Sending Function: ;
List of IP: ;
Ensure:
The flow table capacity: ;
The number of other users’ flow entries: ;
while    do
SENDPACKET
if Flow table is full then
continue
end if
if One of our flow entries is deleted then
break
end if
end while
return ,