Table 5 Connection of malicious nodes.

From: Nature-inspired swarm optimization paradigms for securing semantic web frameworks against DDoS attacks: a computational approach

Cluster

Device

Number of Mal Nodes

Node 6 (C4SW)

Switch (Cluster 4)

5

Node 7 (C5SW)

Switch (Cluster 5)

5