Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Yadong Zhou, Kaiyue Chen, Junjie Zhang, Junyuan Leng, Yazhe Tang

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Article number4760632
JournalSecurity and Communication Networks
Volume2018
DOIs
StatePublished - 2018
Externally publishedYes

ASJC Scopus Subject Areas

  • Information Systems
  • Computer Networks and Communications

Cite this