Changes between Version 43 and Version 44 of GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
- Timestamp:
- 10/30/17 21:13:13 (6 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/NFV/Ryu/HandlingIntrusionwithRyu-portscanning
v43 v44 178 178 179 179 - ''' cd ~/Control/PI_controller ''' 180 - ''' !python PI_controller.py ~/Control/RINA/NFV1.txt'''181 182 183 184 Note that here we are directing '' !PI_controller.py'' to the ''NFV1.txt'' file that is constantly updated by the RINA distributed application with the load information of VNFs.180 - ''' python PI_controller.py ~/Control/RINA/NFV1.txt''' 181 182 183 184 Note that here we are directing ''PI_controller.py'' to the ''NFV1.txt'' file that is constantly updated by the RINA distributed application with the load information of VNFs. 185 185 2. You should see the VNF state information printed on the screen. A sample output is shown below. 186 186 … … 212 212 2. Now we can run the Ryu controller. Execute 213 213 214 - ''' /tmp/ryu/bin/ryu-manager --verbose !/tmp/ryu/ryu/app/nfv_controller.py'''214 - ''' /tmp/ryu/bin/ryu-manager --verbose /tmp/ryu/ryu/app/nfv_controller.py''' 215 215 216 216 == (4) Run Snort == … … 252 252 ''' cd ~/Control/AttackAnalyzer/ ''' 253 253 254 ''' python !AttackAnalyzer.py -f /tmp/snortalert ''' [[BR]]254 ''' python AttackAnalyzer.py -f /tmp/snortalert ''' [[BR]] 255 255 256 256 … … 318 318 319 319 320 4. As soon as the attack is detected, you will see the IP address appearing on the window for !AttackAnalyzer.py. All traffic from this IP address is blocked by AttackAnalyzer. At this point, you can stop the ''PortScanAttack.sh '' file by typing Ctrl+C.320 4. As soon as the attack is detected, you will see the IP address appearing on the window for ''AttackAnalyzer.py''. All traffic from this IP address is blocked by AttackAnalyzer. At this point, you can stop the ''PortScanAttack.sh '' file by typing Ctrl+C. 321 321 322 322