Research Article
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
Algorithm 1
FIFO inference algorithm.
Require: | Packet-Sending Function: ; | List of IP: ; | Ensure: | The flow table capacity: ; | The number of other users’ flow entries: ; | | | | | | while do | | SENDPACKET | | if Flow table is full then | | continue | end if | if One of our flow entries is deleted then | | break | end if | end while | | | return , |
|