Research Article

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

Figure 5

Attack detection and countermeasure without detection delay. (a) Attack detection at VM2. (b) Applying flow table to block VM2. (c) Full AG after countermeasure applied.
(a)
(b)
(c)