Research Article

A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters

Table 3

The setting of device ports and addresses.

DeviceNetworks portAddressState

Controllereth0192.168.71.128
Switch 1eth0, eth1, eth210.0.1.0
Switch 2eth3, eth4, eth510.0.2.0
Switch 3eth1, eth2, eth3, eth4, eth510.0.3.0
Switch 4eth3, eth4, eth510.0.4.0
Switch 5eth1, eth4, eth510.0.5.0
Switch 6eth2, eth3, eth510.0.6.0
Switch 7eth1, eth4, eth510.0.7.0
Switch 8eth1, eth2, eth3, eth4, eth510.0.8.0
Switch 9eth1, eth4, eth510.0.9.0
Switch 10eth1, eth4, eth510.0.10.0
Host Aeth010.0.10.101Normal
Host Beth010.0.1.102Malicious
Host Ceth010.0.8.103Malicious
Host Deth010.0.3.104Malicious
Host Eeth010.0.8.105Malicious