Changes between Version 38 and Version 39 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
- Timestamp:
- 10/30/17 20:32:46 (6 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
v38 v39 248 248 Attack Analyzer reads the snort alerts saved on Controller node and makes decisions about which IP addresses to block. Attack analyzer is the “brain” on the attack control system. It reads the file ''/tmp/snortalerts'', which is generated by RINA on controller node and outputs ''/tmp/attacker.txt'' file which has IP address of all the nodes that Attack Analyzer decides to block based on snort alerts. 249 249 250 1. In a separate window for Controller, download the Attack Analyzer application and run it. [[BR]] 251 252 253 ''' wget !https://raw.githubusercontent.com/akhtarnabeel/public/master/AttackAnalyzer/AttackAnalyzer.py ''' [[BR]] 254 255 256 2. Run the attack analyzer application on controller node [[BR]] 257 250 Open a separate window for Controller, run attack analyzer. [[BR]] 251 252 ''' cd ~/Control/AttackAnalyzer/ ''' 258 253 259 254 ''' python !AttackAnalyzer.py -f /tmp/snortalert ''' [[BR]]