Research Article

Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection

Figure 8

RTT distribution of probe packets. (a) RTT distribution without interference. (b) RTT distribution after interference processing (no initial rules). (c) RTT distribution after interference processing (initially regular).
(a)
(b)
(c)