Research Article

Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks

Figure 4

Topology discovery via flooding attack. Multiple attackers simultaneously generate multiple LLDP packets and transmit them to the switch.