Changes between Version 8 and Version 9 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-ping


Ignore:
Timestamp:
11/01/17 13:17:00 (6 years ago)
Author:
Nabeel Akhtar
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-ping

    v8 v9  
    184184{{{
    185185#!html
    186 <img src="http://csr.bu.edu/rina/grw-bu2016/nfv_ryu/pics/PIPic.png" hspace=40>
     186<img src="https://github.com/akhtarnabeel/public/raw/master/NFV-GENI/Figures/PI_Controller_output.png" hspace=40>
    187187
    188188 }}}
     
    282282 }}}
    283283
    284 5. Type something on the s1 window for netcat and you should NOT see it on the destination window. If you go to the controller window which runs the Ryu controller, you can see that all traffic from the attacker is dropped with the following output:
    285 
    286 {{{
    287 #!html
    288 <img src="http://csr.bu.edu/rina/grw-bu2016/nfv_ryu/pics/intrusion.png" hspace=50>
    289  }}}
     2845. Type something on the s1 window for netcat and you should NOT see it on the destination window.
     285
     286If you go to the controller window which runs the Ryu controller, you can see that all traffic from the attacker is dropped with the following output:
     287
     288{{{
     289#!html
     290<img src="https://github.com/akhtarnabeel/public/raw/master/NFV-GENI/Figures/RyuController_block.png" hspace=50>
     291 }}}
     292
     293If you go to the controller window which runs the Attack Analyzer, you can see the list of IP addresses blocked by Attack Analyzer:
     294
     295{{{
     296#!html
     297<img src="https://github.com/akhtarnabeel/public/raw/master/NFV-GENI/Figures/AttackAnalyzer_output.png" hspace=50>
     298 }}}
     299
    290300
    2913016. Restart the netcat server on the destination by running: