Research Article
Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks
| Link | Source DPID | Source port ID | Destination DPID | Destination port ID |
| 1 | A | 1 | B | 1 | 2 | B | 1 | A | 1 | 3 | B | 2 | D | 1 | 4 | C | 1 | D | 2 | 5 | D | 1 | B | 2 | 6 | D | 2 | C | 1 | 7 | D | 3 | E | 1 | 8 | E | 1 | D | 3 | 9 | E | 2 | F | 1 | 10 | E | 3 | G | 1 | 11 | F | 1 | E | 2 | 12 | G | 1 | E | 3 | 13 | G | 2 | H | 1 | 14 | H | 1 | G | 2 |
|
|