Research Article

Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking

Figure 4

Example 2: an attacker adds flow rules to change the IP address of the packet and thus to mislead the security device.