Research Article
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks
| Symbol | Definition |
| Si | SDN switch i | Ci | The flow table capacity of the switch i | T | Sampling period | Ai(t) | The number of active flow entries in the switch i at t th sampling | pi(t) | The number of new flows arriving at the switch i during t th sampling time | Fij(t) | Flow entry j in the switch i at t th sampling | Pij(t) | The number of matched packets for the entry j in the switch i at t th sampling | Bij(t) | The number of matched bytes of entry j in the switch i at t th sampling | Dij(t) | Duration time of entry j of in the switch i at t th sampling | Si_inportk | Network access port k of the switch i (switch is edge switch) | Ai,jk(t) | The number of flow entries installed on switch i corresponding to the flow from the inport k of switch j | Pi,jk(t) | The number of new flows from the inport k of switch j to the switch i during t th sampling time |
|
|