On May 31, 2014, at 12:02 AM, Silvia Fichera <fichera....@gmail.com> wrote:

> I'm talking about the control traffic. In wireshark I apply a filter related 
> only to SYN packet and the destination of the attack. Yesterday I've tried to 
> use pypy and, when everything works, the result is very close to what I 
> expect (packets by the attackers + few packets retransmitted). 
> There is still a little problem. Every simulation I print a file with all the 
> attackers seen by the controller and, sometimes, some of them is missing. In 
> that case I have a surplus of packets (3 or 4 times what I expect). The 
> behavior is not uniform in every case.

In those bad cases, you might check the OVS log.

> 
> Thanks
> 
> 
> 
> 2014-05-30 5:36 GMT+02:00 Murphy McCauley <murphy.mccau...@gmail.com>:
> On May 28, 2014, at 3:50 AM, Silvia Fichera <fichera....@gmail.com> wrote:
> 
> > Dear all,
> > I have a network with an hundred hosts in which most of them perform 
> > SYN-Flood attack. My implementation foresees a threshold to detect the 
> > attack (Controller tests the source pretending to be the real destination 
> > since the source doesn't complete 3-way handshake procedure. Only the 
> > honest source can talk to the real destination of the attack) and install a 
> > dropping rule on first switch when the threshold exceed.
> 
> This design sounds like potentially a very great amount of traffic gets sent 
> to a controller over the OpenFlow connection.
> 
> > I am able to count the number of syn received by the controller with a 
> > counter that I added in it (I expect this should be equal to the number of 
> > the attackers times the threshold, but it is not so ), and if I compare 
> > this number with Wireshark capture I see a lot of packets more.
> 
> A Wireshark capture of what?  The control traffic, or the normal data plane 
> traffic?
> 
> > There is a reason for this behavior? Could be because of the responsiveness 
> > of the controller?
> 
> It certainly could be because of the responsiveness of the controller.
> 
> Have you checked the OVS log?  You may find interesting log messages such as 
> "dropping packet-in due to queue overflow".
> 
> You could try running POX using PyPy and see if your numbers get closer.
> 
> > Moreover, I know that Pox is single thread. There is any buffer in which 
> > incoming packets are queued?
> 
> Within POX, they're handled immediately.  But there are buffers in the 
> system, e.g., in the networking stack on the controller machine and the 
> switch machine.
> 
> -- Murphy
> 
> 
> 
> -- 
> Silvia Fichera

Reply via email to