Changes between Version 23 and Version 24 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning


Ignore:
Timestamp:
10/30/17 17:59:09 (7 years ago)
Author:
Nabeel Akhtar
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning

    v23 v24  
    306306''' sudo apt-get install nmap '''
    307307
    308 3. Run the file to create an attack
     3083. Attack file has following content
     309
     310{{{
     311#!html
     312<img src="https://raw.githubusercontent.com/akhtarnabeel/public/master/Figures/output.png" hspace=20>
     313 }}}
     314
     315Every 0.2 seconds, source node generates a ping to destination node and the output of ping is saved in ping.log file.
     316
     317Run the file to create an attack
    309318
    310319''' chmod 777 !PortScanAttack.sh '''
     
    313322
    314323
     324Soon after starting ping message, nmap is used to attack destination. We can use ping output to measure how long it took to detect the attack, by counting the number of successful pings. Here is sample output
     325
     326
     327{{
     328#!html
     329<img src="https://raw.githubusercontent.com/akhtarnabeel/public/master/Figures/sample.png" hspace=20>
     330 }}}
    315331
    316332