Full Monty Python Holy Grail ......
One scenario he floated posited detection of unusual activity that could represent an attack. SDN could allow a change in network configuration that is transparent to the attacker but redirects them away from their target and into a honeypot set up for capture of forensics data.
:-)> One can have a great deal of fun imagining El Reg as a Stealthy IntelAIgent Service tool phishing for Alternatives and/or Disruptives outing themselves in their comments on threads replying to tales shared.
There has been no evidence though of any successful utilisation by incumbent establishment systems of the novelties which be provided. A real virtual metadata case of PERL before swine?! :-)>