Research Article
Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection
Algorithm 1
Active jamming algorithm.
| Input: Flow, n, Delay table | | Output: Flow of the 2 to n + 1 packets is delayed | (1) | Monitor () | (2) | while TRUE do: | (3) | packeti ← Flow | (4) | P = Parser (packet1) | (5) | if R in (Flow table with P satisfied): | (6) | R.action (packeti) | (7) | counters + 1 | (8) | Add (dpid, port) with Delay table | (9) | while counters = = n: | (10) | Remove (dpid, port) | (11) | else: | (12) | Packet-in, t1 ← nowtime | (13) | = [Src_IP, Dst_IP, Src_MAC, Dst_MAC] | (14) | if Bloom Filter = = 1: | (15) | [dpid, port] | (16) | Packet-out, t2 ← nowtime | (17) | R’.action(packeti) | (18) | counters + 1 | (19) | Add (dpid, port) with MA (t2 − t1) | (20) | while counters = = n | (21) | Remove (dpid, port) | (22) | end while | (23) | end while |
|