Research Article

Validating User Flows to Protect Software Defined Network Environments

Algorithm 1

Steps involved for prevention of spoofing attack.
Step 1. Start
Step 2. Controller updates the states of switches
Step 3. Controller requests hash functions
Step 4. Switches response with hash functions
Step 5. Hash validation
ā€‰If (Original hash)
Creates secure link (Goto Step 6)
Else
Invalid switch
Step 6. Begin migrating the flow between switches
Step 7. End