Research Article

Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking

Figure 3

Example 1: an attacker tampers with flow rules and uses it to allow malicious packets bypass a security device.