Skip to main content
. 2020 Dec 20;20(24):7326. doi: 10.3390/s20247326
Algorithm 1 End-to-end Operation
  • LS← Get connected SDN switches

  • M← Load RF classifier model

  • LB← Blacklist

  • while True do

  •   for all S in LS do

  •     LE← Pull flow entries from S

  •     F← FEATURE_CREATION(LE)

  •     ATTACK_DETECTION(F)

  •   end for

  •   Wait for some time

  • end while

  • procedureAttack_Detection(F)

  •   C← Classify F using M

  •   if C is attack then

  •     I← Get source identifiers from F

  •     MITIGATION(C,I)

  •   end if

  • end procedure

  • procedureMitigation(C,I)

  •   if I is not in LB then

  •     E← Create flow entry to block or redirect I

  •     Install E into S

  •     LB.add(I)

  •   end if

  • end procedure