From 669f98170d25d5273507a0eb9a30fd3a50e59022 Mon Sep 17 00:00:00 2001 From: Mohamed Lamine Messai <mohamed-lamine.messai@univ-lyon2.fr> Date: Tue, 13 Feb 2024 11:17:45 +0000 Subject: [PATCH] Update file README.md --- README.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/README.md b/README.md index af9a0ec..ef91780 100644 --- a/README.md +++ b/README.md @@ -25,6 +25,13 @@ Conversely, the adversary network features a botnet comprising multiple zombie m For implementing this environment, we used the GNS3 tool. It is an open-source software for network emulation. It empowers users to design, configure, and test intricate network topologies within a virtual environment. +## 1. Normal traffic generation +For normal traffic generation, we used multiple virtual machine that were supposed to mimic the behavior of real network users. It consisted of 3 Ubuntu VMs that served as users and another Ubuntu VM that played the role of a local server providing services such as web site hosting and file sharing using FTP. We also used an Ubuntu VM to run IoT-Flock, an IoT devices simulation tool. We used it to simulate the following devices: Light intensity sensor, Temperature sensor, Smoke sensor, Door lock, Fan speed controller. +## 2. Attack scenarios +As for the attack scenarios, we used a botnet composed of multiple VMs controlled by a Kali virtual machine. This botnet was able to launch a variety of network attacks on the local server described above. These attacks included the following: HTTP GET flood, HTTP POST flood, ICMP flood, TCP SYN flood, UDP flood, Port scanning and Brute force. +## 3. Data capture +To capture the network trafic in our environment, we used a flow capture tool called CICFlowmeter. + ## Graph modeling -- GitLab