Research Article
Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection
Figure 8
RTT distribution of probe packets. (a) RTT distribution without interference. (b) RTT distribution after interference processing (no initial rules). (c) RTT distribution after interference processing (initially regular).
(a) |
(b) |
(c) |