Research Article

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

Algorithm 2

Algorithm to generate a full AG.
procedure fullAG
Markvisited
if then
  Return Stack
else if then
  for do
   
   if is uniquely alignedthen
    fullAG
   end if
  end for
else
  
end if
end procedure