Research Article

[Retracted] An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks

Table 4

Descriptions and benchmarks of the big data stream attacks

Attack nodesNormal packets (packet/s)Spoofing packets (packet/s)Attack descriptionsTypeSpoofing packetsSpoofing flows
NormalAnomalyNormalAnomaly

H179.3%SYN flood, 15.9%UDP flood, 4.2%TCP flood, 0.6%ICMP flood(A)105611831584185794403185826
H2
H3(B)58718675861451591788212512
H4
H9(C)259812312990259316125386521
H10
H12