At present, attacks based on the vulnerability of controller and flooding still constitute a principal threat for hierarchical Software Defined Network (SDN), such as flow table tampering, malicious Application attacks, Distributed Denial Service (DDoS) etc., due to limitation against known or unknown vulnerabilities traditional cyber defence technology. Therefore, this study proposes an active...