Research Article

A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks

Figure 15

The resource consumption of SAIA system under different network sizes. (a) CPU utilization. (b) Throughput.
(a)
(b)