Research Article
Cross-Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN
Table 3
Summary of four defense methods.
| Method | Response time (s) | Host connection success rate (%) | CPU usage (%) |
| DAISY [40] | 2.9 | 69 | 10 | BWManager [37] | 4.2 | 82 | 20 | FloodDefender [38] | 3.8 | 90 | 11 | Our method | 1.9 | 99.8 | 5 |
|
|