284 | | 5. Type something on the s1 window for netcat and you should NOT see it on the destination window. If you go to the controller window which runs the Ryu controller, you can see that all traffic from the attacker is dropped with the following output: |
285 | | |
286 | | {{{ |
287 | | #!html |
288 | | <img src="http://csr.bu.edu/rina/grw-bu2016/nfv_ryu/pics/intrusion.png" hspace=50> |
289 | | }}} |
| 284 | 5. Type something on the s1 window for netcat and you should NOT see it on the destination window. |
| 285 | |
| 286 | If you go to the controller window which runs the Ryu controller, you can see that all traffic from the attacker is dropped with the following output: |
| 287 | |
| 288 | {{{ |
| 289 | #!html |
| 290 | <img src="https://github.com/akhtarnabeel/public/raw/master/NFV-GENI/Figures/RyuController_block.png" hspace=50> |
| 291 | }}} |
| 292 | |
| 293 | If you go to the controller window which runs the Attack Analyzer, you can see the list of IP addresses blocked by Attack Analyzer: |
| 294 | |
| 295 | {{{ |
| 296 | #!html |
| 297 | <img src="https://github.com/akhtarnabeel/public/raw/master/NFV-GENI/Figures/AttackAnalyzer_output.png" hspace=50> |
| 298 | }}} |
| 299 | |