Research Article

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

Figure 6

Attack detection and countermeasure with detection delay. (a) Attack detection at VM2. (b) Applying flow table to block VM2 and SW1. (c) Full AG after countermeasure applied.
(a)
(b)
(c)