Research Article
Validating User Flows to Protect Software Defined Network Environments
Algorithm 1
Steps involved for prevention of spoofing attack.
Step 1. Start | Step 2. Controller updates the states of switches | Step 3. Controller requests hash functions | Step 4. Switches response with hash functions | Step 5. Hash validation | āIf (Original hash) | | Creates secure link (Goto Step 6) | Else | Invalid switch | | Step 6. Begin migrating the flow between switches | Step 7. End |
|