Changes between Version 42 and Version 43 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
- Timestamp:
- 10/30/17 21:12:12 (7 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
v42 v43 178 178 179 179 - ''' cd ~/Control/PI_controller ''' 180 - ''' python PI_controller.py ~/Control/RINA/NFV1.txt'''181 182 183 184 Note that here we are directing '' PI_controller.py'' to the ''NFV1.txt'' file that is constantly updated by the RINA distributed application with the load information of VNFs.180 - ''' !python PI_controller.py ~/Control/RINA/NFV1.txt''' 181 182 183 184 Note that here we are directing ''!PI_controller.py'' to the ''NFV1.txt'' file that is constantly updated by the RINA distributed application with the load information of VNFs. 185 185 2. You should see the VNF state information printed on the screen. A sample output is shown below. 186 186 … … 212 212 2. Now we can run the Ryu controller. Execute 213 213 214 - ''' /tmp/ryu/bin/ryu-manager --verbose /tmp/ryu/ryu/app/nfv_controller.py'''214 - ''' /tmp/ryu/bin/ryu-manager --verbose !/tmp/ryu/ryu/app/nfv_controller.py''' 215 215 216 216 == (4) Run Snort == … … 318 318 319 319 320 4. As soon as the attack is detected, you will see the IP address appearing on the window for AttackAnalyzer.py. All traffic from this IP address is blocked by AttackAnalyzer. At this point, you can stop the ''PortScanAttack.sh '' file by typing Ctrl+C.320 4. As soon as the attack is detected, you will see the IP address appearing on the window for !AttackAnalyzer.py. All traffic from this IP address is blocked by AttackAnalyzer. At this point, you can stop the ''PortScanAttack.sh '' file by typing Ctrl+C. 321 321 322 322