Research Article

NOSArmor: Building a Secure Network Operating System

Figure 9

Ping result from host A to C before topology poisoning attack.