Research Article
[Retracted] An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks
Table 4
Descriptions and benchmarks of the big data stream attacks
| Attack nodes | Normal packets (packet/s) | Spoofing packets (packet/s) | Attack descriptions | Type | Spoofing packets | Spoofing flows | Normal | Anomaly | Normal | Anomaly |
| H1 | | | 79.3%SYN flood, 15.9%UDP flood, 4.2%TCP flood, 0.6%ICMP flood | (A) | 10561183 | 1584185 | 794403 | 185826 | H2 | | | H3 | | | (B) | 5871867 | 5861451 | 591788 | 212512 | H4 | | | H9 | | | (C) | 2598123 | 12990259 | 316125 | 386521 | H10 | | | H12 | | |
|
|