Research Article
SDNDefender: A Comprehensive DDoS Defense Mechanism Using Hybrid Approaches over Software Defined Networking
Table 7
Settings for emulating TCP SYN flood attack.
| Parameter | Value |
| TCP SYN packets, a benign host sends | 30 | TCP SYN packets, an attacker sends | 1000 | The payload of a TCP SYN packet | 64 bytes | The capacity of the sliding window | 6 | The threshold of sequential entropy outliers | 3 | The difference threshold of two hurst indexes | 0.12 | The normal hurst threshold | 0.5 | The significance level of the flow goodput set | 0.05 | The confidence upper limit of the flow goodput set | 10000 bps | Bandwidth factor for anomaly traffic | 0.1 | Limit of acceptable SYN requests in SRL | 200 | Limit of replaced flow entries in SRL | 15 | Illegal request threshold of a host in SLICOTS | 50 |
|
|