:HiI lunch DDoS attack on host in mnininet with OpenFlow13 switches connected
to Ryu controller. I send the traffic from topology code, so there is multiple
hosts send huge traffic in small duration. When I collected the flows with
there statistics, I saw three errors on the controller side: one returned from
switches, and the other two is python errors
The first is with code 1 type 8,
The second is [Error 32]: Broken pipe.
The third is [Error 104] Connection reset by peer.
what this errors? and when they are generated?
Regards,Eman
------------------------------------------------------------------------------
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
consuming the most bandwidth. Provides multi-vendor support for NetFlow,
J-Flow, sFlow and other flows. Make informed decisions using capacity
planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel