Changes between Version 43 and Version 44 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning


Ignore:
Timestamp:
10/30/17 21:13:13 (6 years ago)
Author:
Nabeel Akhtar
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning

    v43 v44  
    178178
    179179         - ''' cd ~/Control/PI_controller '''
    180          - ''' !python PI_controller.py ~/Control/RINA/NFV1.txt'''
    181 
    182 
    183 
    184  Note that here we are directing ''!PI_controller.py'' to the ''NFV1.txt'' file that is constantly updated by the RINA distributed application with the load information of VNFs.
     180         - ''' python PI_controller.py ~/Control/RINA/NFV1.txt'''
     181
     182
     183
     184 Note that here we are directing ''PI_controller.py'' to the ''NFV1.txt'' file that is constantly updated by the RINA distributed application with the load information of VNFs.
    185185  2.     You should see the VNF state information printed on the screen. A sample output is shown below.
    186186
     
    212212 2.     Now we can run the Ryu controller. Execute
    213213
    214         - ''' /tmp/ryu/bin/ryu-manager --verbose !/tmp/ryu/ryu/app/nfv_controller.py'''
     214        - ''' /tmp/ryu/bin/ryu-manager --verbose /tmp/ryu/ryu/app/nfv_controller.py'''
    215215
    216216== (4) Run Snort  ==
     
    252252''' cd ~/Control/AttackAnalyzer/ '''
    253253
    254 ''' python !AttackAnalyzer.py -f /tmp/snortalert ''' [[BR]]
     254''' python AttackAnalyzer.py -f /tmp/snortalert ''' [[BR]]
    255255
    256256
     
    318318
    319319
    320 4. As soon as the attack is detected, you will see the IP address appearing on the window for !AttackAnalyzer.py. All traffic from this IP address is blocked by AttackAnalyzer. At this point, you can stop the ''PortScanAttack.sh '' file by typing Ctrl+C.
     3204. As soon as the attack is detected, you will see the IP address appearing on the window for ''AttackAnalyzer.py''. All traffic from this IP address is blocked by AttackAnalyzer. At this point, you can stop the ''PortScanAttack.sh '' file by typing Ctrl+C.
    321321
    322322