Research Article
Validating User Flows to Protect Software Defined Network Environments
| Flow | Attacks | Action |
| (i) Ethernet source & destination (ii) Source & destination IP (iii) Source & destination port (iv) Protocol type | (i) Flow table overloading attack (ii) DDoS attack (iii) Spoofing attack | (i) Alert (ii) Block (iii) Forward |
|
|