Research Article
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
Require: | Packet-Sending Function: ; | List of IP: ; | Ensure: | The flow table capacity: ; | The number of other users’ flow entries: ; | | | | | ) | | while do | | | ROLLINGPACKETSENDER | | if Flow table is full then | | continue | end if | if One of our flow entries is deleted then | | break | end if | end while | | | return , |
|