Research Article
Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks
Figure 4
Topology discovery via flooding attack. Multiple attackers simultaneously generate multiple LLDP packets and transmit them to the switch.