Research Article

A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks

Figure 10

OMM steps to delete flow entries. (a) Data maintained by OMM when the flow table is about to overflow. (b) Delete the flow entries with lower f1 attack value. (c) Delete the flow entries with higher fLRU value within higher f2attack value pair. (d) Delete the flow entries with higher fLRU value.
(a)
(b)
(c)
(d)