Research Article

Cross-Plane DDoS Attack Defense Architecture Based on Flow Table Features in SDN

Table 3

Summary of four defense methods.

MethodResponse time (s)Host connection success rate (%)CPU usage (%)

DAISY [40]2.96910
BWManager [37]4.28220
FloodDefender [38]3.89011
Our method1.999.85