Research Article
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models
Figure 5
Attack detection and countermeasure without detection delay. (a) Attack detection at VM2. (b) Applying flow table to block VM2. (c) Full AG after countermeasure applied.
(a) |
(b) |
(c) |