Skip to content

final year project that about detect malicious traffics in software defined network(SDN)

Notifications You must be signed in to change notification settings

shunwatai/SDN_school_project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

What is this?

  • This is just a school project that about "SDN security". However, it is not really about the security in SDN. I was actually working on "detecting the traditional malicious traffics in SDN".

  • Also:

    • the code are messy and unreadable.
    • do not expect has good performance
    • many bugs

Description

read this first

  • I am using the RYU controller in this project.
  • All the experiments test in the Mininet VM
  • I mainly aim to detect the following malicious traffics in SDN:
    • Scanning probe traffics like nmap, ncat or maybe telnet for HTTP
    • "Potential flooding" - it is a rubbish because I just set a threshold manually in simple_monitor_13.py for flow stat and port stat for the detection
  • Currently, I only upload the parser coding for convert pcap to csv
  • I will upload the codes of RYU later in May after the final presentation

folder structure in this repo

  • pcap_parsing_and_data_training/ store the code of pcap parser and the ML code for training the clf(classifiers). Those clf are used in RYU later
  • ryu_code/ store the ryu controller codes, there will be only 2 files example_switch_13.py & simple_monitor_13.py

About

final year project that about detect malicious traffics in software defined network(SDN)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published