Changes between Version 38 and Version 39 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning


Ignore:
Timestamp:
10/30/17 20:32:46 (6 years ago)
Author:
Nabeel Akhtar
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning

    v38 v39  
    248248Attack Analyzer reads the snort alerts saved on Controller node and makes decisions about which IP addresses to block. Attack analyzer is the “brain” on the attack control system. It reads the file ''/tmp/snortalerts'', which is generated by RINA on controller node and outputs ''/tmp/attacker.txt'' file which has IP address of all the nodes that Attack Analyzer decides to block based on snort alerts.
    249249
    250 1. In a separate window for Controller, download the Attack Analyzer application and run it. [[BR]]
    251 
    252 
    253 ''' wget !https://raw.githubusercontent.com/akhtarnabeel/public/master/AttackAnalyzer/AttackAnalyzer.py ''' [[BR]]
    254 
    255  
    256 2. Run the attack analyzer application on controller node [[BR]]
    257  
     250Open a separate window for Controller, run attack analyzer. [[BR]]
     251
     252''' cd ~/Control/AttackAnalyzer/ '''
    258253
    259254''' python !AttackAnalyzer.py -f /tmp/snortalert ''' [[BR]]