Research Article
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks
| | Controller routing strategy | SAIA system related parameters |
| Parameter | Routing algorithm | Match fields | hard-timeout | idle-timeout | Type-I attack sh1 | Type-II attack sh2 | α | Avgb | β |
| Value | Dijkstra | 8 tuples | 0 s | 20 s | 10 | 2 | 0.8 | 128 | 0.6 |
|
|