Algorithm 2 Mechanism of Anomaly Detection. |
-
1:
for, do
-
2:
Listening Packet-In message from
-
3:
Extract MAC, IP of source host
-
4:
if ≠ MAC, then
-
5:
Report AIM to mitigator module
-
6:
if ≠ IP, then
-
7:
Report AII to detector module
-
8:
for, do
-
9:
Caculate
-
10:
if , then
-
11:
Report to detector module
-
12:
else
-
13:
Remove all port from
|