Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Algorithm 2

Rolling maintaining algorithm.
Require
Packet-Sending Function: ;
List of Inserted IP: ;
functionROLLINGPACKETSENDER
while    do
for  ; ;   do
SENDPACKET
end for
end while
end function