Research Article

A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks

Figure 4

Different attack flow patterns. (a) Type-I attack flow and (b) Type-II attack flow.
(a)
(b)