Saturation Attack in SDN
Saturation Attack in SDN
Saturation Attack in SDN
1. Rate Limiting: This involves limiting the number of requests that can be
sent to the controller in a given period. This can help prevent the
controller from being overwhelmed by a large number of requests.
2. Flow Table Verification: This involves verifying that each flow table
modification request is valid before it is processed by the controller. This
can help prevent malicious requests from being processed by the
controller.
3. Controller Redundancy: This involves having multiple controllers in the
network, which can provide redundancy in case one controller becomes
unresponsive due to a saturation attack.
4. Traffic Isolation: This involves isolating the traffic that is sent to the
controller from the rest of the network traffic. This can help prevent the
controller from being overwhelmed by unrelated traffic.