Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Yadong Zhou, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Article number4760632
JournalSecurity and Communication Networks
Volume2018
DOIs
StatePublished - Jan 1 2018

ASJC Scopus Subject Areas

  • Information Systems
  • Computer Networks and Communications

Disciplines

  • Computer Sciences
  • Engineering

Cite this