Research Article

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

Figure 2

The overall working scenario before an attack is detected.