Skip to main content
. 2023 Jul 5;23(13):6176. doi: 10.3390/s23136176
Algorithm 2: Mitigation procedure.
1: Begin
2: get corresponding Datapath
3: set matching criteria with respect to αinport
4: send a flow modification message to switch
5: drop packets corresponding to αinport of adpid
6: End