This is a proof of concept demonstration for the use of FaucetSDN to implement active defensive strategies for cyber deception.
The demo system is physically wired like this:
- Acls file should look like acls.yaml
- Faucet configuration must include ACLS from step 1 and have a port designated as a coprocessor as on line 7 of faucet.yaml
- clone Pipette onto the machine with
git clone https://github.com/IQTLabs/pipette.git
- copy pipettecconf.sh into the directory
- edit pipetteconf.sh to ensure that the
COPROINT
value is set to the id of the physical interface connected to the coprocessor switchport. ./runpipette.sh
- build coprocessed services:
cd fakeWebserver && ./start.sh
cd realDbServer && ./start.sh
- clone to the appropriate machine
cd realWebserver && ./start.sh
- clone to the appropriate machine
cd dbWebServer
docker build -t vd_dbws .
docker run --name=vd_dbws -d -p <IP>:<PORT>:80 vd_dbws