Research Article

An SDN-Based Approach to Ward Off LAN Attacks

Figure 2

Port stealing.