Research Article

An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

Figure 1

FPH architecture. (The blue line indicates the outgoing traffic route in a benign communication; the red line indicates the outgoing traffic route in a suspicious communication.)