-
This is just a school project that about "SDN security". However, it is not really about the security in SDN. I was actually working on "detecting the traditional malicious traffics in SDN".
-
Also:
- the code are messy and unreadable.
- do not expect has good performance
- many bugs
- I am using the RYU controller in this project.
- All the experiments test in the Mininet VM
- I mainly aim to detect the following malicious traffics in SDN:
- Scanning probe traffics like nmap, ncat or maybe telnet for HTTP
- "Potential flooding" - it is a rubbish because I just set a threshold manually in
simple_monitor_13.py
for flow stat and port stat for the detection
- Currently, I only upload the parser coding for convert pcap to csv
- I will upload the codes of RYU later in May after the final presentation
pcap_parsing_and_data_training/
store the code of pcap parser and the ML code for training the clf(classifiers). Those clf are used in RYU laterryu_code/
store the ryu controller codes, there will be only 2 filesexample_switch_13.py
&simple_monitor_13.py