Research Article
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models
Table 2
Operation system and vulnerabilities in each node.
| Node | OS | CVE ID | CVSS BS | Impact |
| | Win 7 | CVE-2013-0013 | 5.8 | 4.9 | CVE-2012-0001 | 9.3 | 10 |
| | Win 7 | CVE-2015-0006 | 6.1 | 4.7 | CVE-2015-1675 | 9.3 | 10 |
| | Linux | CVE-2012-4546 | 4.3 | 2.9 | CVE-2014-0100 | 9.3 | 8.2 |
| | Win 7 | CVE-2017-8495 | 6.0 | 4.8 | CVE-2017-8717 | 9.3 | 10 |
| | Linux | CVE-2015-7312 | 4.4 | 2.9 | CVE-2015-4002 | 9.0 | 8.5 |
| | Linux | CVE-2017-0626 | 4.3 | 2.9 | CVE-2017-6264 | 9.3 | 8.2 |
| | Openflow 2.5 | CVE-2014-5035 | 6.8 | 6.4 |
| | Openflow 2.7 | CVE-2017-9263 | 6.5 | 6.5 |
| | Openflow 2.8 | CVE-2017-14970 | 5.9 | 6.8 |
|
|