Fig. 4From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environmentsTraffic discard attack testBack to article page