Research Article

Validating User Flows to Protect Software Defined Network Environments

Table 4

Flow table rules.

FlowAttacksAction

(i) Ethernet source & destination
(ii) Source & destination IP
(iii) Source & destination port
(iv) Protocol type
(i) Flow table overloading attack
(ii) DDoS attack
(iii) Spoofing attack
(i) Alert
(ii) Block
(iii) Forward