Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Algorithm 3

LRU inference algorithm.
Require:
Packet-Sending Function: ;
List of IP: ;
Ensure:
The flow table capacity: ;
The number of other users’ flow entries: ;
)
while    do
ROLLINGPACKETSENDER
if Flow table is full then
continue
end if
if One of our flow entries is deleted then
break
end if
end while
return  ,