Research Article
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks
Figure 1
FPH architecture. (The blue line indicates the outgoing traffic route in a benign communication; the red line indicates the outgoing traffic route in a suspicious communication.)