This document summarizes a research project exploring DDoS vulnerabilities in OpenFlow controllers. The researchers aimed to test if an OpenFlow controller could be overwhelmed by a flood of packet-in messages from switches. They found that the Floodlight controller's performance degraded significantly under high packet-in loads. They also demonstrated a way to generate packet-in events from endpoint hosts using specially crafted ARP packets, allowing them to deny network service. The research highlights security issues in current SDN implementations and the need for mechanisms like rate limiting and anomaly detection to mitigate DDoS risks.