Research Article
Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection
Table 2
Experiment host-related information.
| Host | IP | MAC |
| Attacked host | 10.0.0.1 | 00 : 00 : 00 : 00 : 00 : 01 | Normal hosts | 10.0.0.2 | 00 : 00 : 00 : 00 : 00 : 02 | | 10.0.0.3 | 00 : 00 : 00 : 00 : 00 : 03 | … | … | … | | 10.0.0.8 | 00 : 00 : 00 : 00 : 00 : 08 |
|
|