Changes between Version 3 and Version 4 of GENIExperimenter/GENIWebinars/DenialOfServiceDetectionAndMitigationOnGeni


Ignore:
Timestamp:
12/02/16 16:06:18 (7 years ago)
Author:
Ben Newton
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIExperimenter/GENIWebinars/DenialOfServiceDetectionAndMitigationOnGeni

    v3 v4  
    77
    88=== Abstract ===
    9 The goal of this webinar is to demonstrate how you can use GENI for cybersecurity research and education projects. First we will run a simple TCP SYN flood attack and use Wireshark to visualize the surge of traffic. We will then use an Intrusion Detection System (IDS), snort, and write a simple  rule to detect the attack. Finally, we will use SDN flow tables and drop/redirect rules to mitigate the attack. These labs were created for the project !"CyberPaths" that aims to introduce cybersecurity education in liberal arts colleges using GENI.
     9The goal of this webinar is to demonstrate how you can use GENI for cybersecurity research and education projects. First we will run a simple TCP SYN flood attack and use Wireshark to visualize the surge of traffic. We will then use an Intrusion Detection System (IDS), snort, and write a simple  rule to detect the attack. Finally, we will use SDN flow tables and drop/redirect rules to mitigate the attack. These labs were created for the project "!CyberPaths" that aims to introduce cybersecurity education in liberal arts colleges using GENI.
    1010
    1111{{{