Research Article

Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection

Algorithm 1

Active jamming algorithm.
Input: Flow, n, Delay table
Output: Flow of the 2 to n + 1 packets is delayed
(1) Monitor ()
(2) while TRUE do:
(3)   packeti ← Flow
(4)   P = Parser (packet1)
(5)   if R in (Flow table with P satisfied):
(6)     R.action (packeti)
(7)     counters + 1
(8)   Add (dpid, port) with Delay table
(9)   while counters = = n:
(10)      Remove (dpid, port)
(11)  else:
(12)    Packet-in, t1 ← nowtime
(13)     = [Src_IP, Dst_IP, Src_MAC, Dst_MAC]
(14)    if Bloom Filter  = = 1:
(15)      [dpid, port]
(16)    Packet-out, t2 ← nowtime
(17)    R’.action(packeti)
(18)    counters + 1
(19)    Add (dpid, port) with MA (t2 − t1)
(20)    while counters = = n
(21)      Remove (dpid, port)
(22)    end while
(23)end while