Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Figure 2

RTT measurement of different flow table state.
(a)
(b)