Research Article
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
Algorithm 2
Rolling maintaining algorithm.
Require | Packet-Sending Function: ; | List of Inserted IP: ; | functionROLLINGPACKETSENDER | | while do | for ; ; do | | SENDPACKET | end for | | end while | end function |
|