Research Article
Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks
Table 1
Related research comparison.
| Features | Detection of topology discovery via injection attack | Detection of topology discovery via man-in-the-middle attack | Detection of topology discovery via flooding attack |
| KHMAC [21] | Supported | Supported | Not supported | SALL [22] | Not supported | Supported | Not supported | sOFDP [23] | Not supported | Not supported | Supported | SLDP [24] | Supported | Not supported | Supported | Proposed | Supported | Supported | Supported |
|
|