Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Table 1

Default timeout values.

Controller Hard_timeoutIdle_timeout

Ryu00
Beacon05 s
Floodlight05 s
NOX05 s
POX30 s10 s
Trema060 s
Maestro180 s30 s