Changes between Version 23 and Version 24 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
- Timestamp:
- 10/30/17 17:59:09 (7 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
v23 v24 306 306 ''' sudo apt-get install nmap ''' 307 307 308 3. Run the file to create an attack 308 3. Attack file has following content 309 310 {{{ 311 #!html 312 <img src="https://raw.githubusercontent.com/akhtarnabeel/public/master/Figures/output.png" hspace=20> 313 }}} 314 315 Every 0.2 seconds, source node generates a ping to destination node and the output of ping is saved in ping.log file. 316 317 Run the file to create an attack 309 318 310 319 ''' chmod 777 !PortScanAttack.sh ''' … … 313 322 314 323 324 Soon after starting ping message, nmap is used to attack destination. We can use ping output to measure how long it took to detect the attack, by counting the number of successful pings. Here is sample output 325 326 327 {{ 328 #!html 329 <img src="https://raw.githubusercontent.com/akhtarnabeel/public/master/Figures/sample.png" hspace=20> 330 }}} 315 331 316 332