Research Article
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models
| SW ID | Match fields | Action | Priority | Port | Src | Dst |
| | 1 | | | Forward port 2 | 1 | 2 | | | Forward port 3 | 1 | 2 | | | Forward port 3 | 1 | 4 | | | Forward port 5 | 3 | | | | Drop | 9 |
| | 1 | | | Forward port 2 | 1 | 2 | | | Forward port 3 | 3 | 4 | | | Forward port 2 | 3 | 4 | | | Forward port 2 | 3 | | | | Drop | 2 |
| | 1 | | | Forward port 2 | 1 |
|
|