Research Article

A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models

Table 1

The flow table.

SW IDMatch fieldsActionPriority
PortSrcDst

1Forward port 21
2Forward port 31
2Forward port 31
4Forward port 53
Drop9

1Forward port 21
2Forward port 33
4Forward port 23
4Forward port 23
Drop2

1Forward port 21