Research Article

Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks

Table 1

Related research comparison.

FeaturesDetection of topology discovery via injection attackDetection of topology discovery via man-in-the-middle attackDetection of topology discovery via flooding attack

KHMAC [21]SupportedSupportedNot supported
SALL [22]Not supportedSupportedNot supported
sOFDP [23]Not supportedNot supportedSupported
SLDP [24]SupportedNot supportedSupported
ProposedSupportedSupportedSupported