Research Article

A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks

Figure 5

The CDF of the number of flows, packets, and bytes correspond to the duration of flow.