“…Most take advantage of SDN for improving services required to secure systems and networks, such as policy enforcement (e.g., access control, firewalling, middleboxes as middlepipes [27]) [100], [326], [335], [324], [27], DoS attacks detection and mitigation [323], [334], random host mutation [324] (i.e., randomly and frequently mutate the IP addresses of end-hosts to break the attackers' assumption about static IPs, which is the common case) [329], monitoring of cloud infrastructures for finegrained security inspections (i.e., automatically analyze and detour suspected traffic to be further inspected by specialized network security appliances, such as deep packet inspection systems) [321], traffic anomaly detection [352], [323], [334], fine-grained flow-based network access control [325], fine-grained policy enforcement for personal mobile applica-tions [327] and so forth [100], [326], [323], [329], [321], [324], [335], [352]. Others address OpenFlow-based networks issues, such as flow rule prioritization, security services composition, protection against traffic overload, and protection against malicious administrators [201], [258], [320], [328], [199].…”