Skip to content
Snippets Groups Projects
Commit 669f9817 authored by Mohamed Lamine Messai's avatar Mohamed Lamine Messai
Browse files

Update file README.md

parent 35499c5d
No related branches found
No related tags found
No related merge requests found
...@@ -25,6 +25,13 @@ Conversely, the adversary network features a botnet comprising multiple zombie m ...@@ -25,6 +25,13 @@ Conversely, the adversary network features a botnet comprising multiple zombie m
For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment. For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment.
## 1. Normal traffic generation
For normal traffic generation, we used multiple virtual machine that were supposed to mimic the behavior of real network users. It consisted of 3 Ubuntu VMs that served as users and another Ubuntu VM that played the role of a local server providing services such as web site hosting and file sharing using FTP. We also used an Ubuntu VM to run IoT-Flock, an IoT devices simulation tool. We used it to simulate the following devices: Light intensity sensor, Temperature sensor, Smoke sensor, Door lock, Fan speed controller.
## 2. Attack scenarios
As for the attack scenarios, we used a botnet composed of multiple VMs controlled by a Kali virtual machine. This botnet was able to launch a variety of network attacks on the local server described above. These attacks included the following: HTTP GET flood, HTTP POST flood, ICMP flood, TCP SYN flood, UDP flood, Port scanning and Brute force.
## 3. Data capture
To capture the network trafic in our environment, we used a flow capture tool called CICFlowmeter.
## Graph modeling ## Graph modeling
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment