In the currently released version you only can review a simulation. One point we completely missed prior to the Open Source release,was the exchange and retrieval of networks. If we worked on a simulation project everything was under version control and only the review was needed. For the review you of course retrieve the complete network from the database, you just do not have the option of exporting/saving it. I will add a feature request for this, and see if it can squeezed into the next version, which already addresses other issues surrounding the exchange of simulation projects between different people.
The demo itself is a show case for the device capable of detecting (D)DoS attacks and blocking the attack, and of course showing the effects of a DDoS attack without such devices. Our research activities (not part of the demo) were about the cost effective placement of such device and not the actual attack detection and mitigation.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
can someone explain example ddosdemo?
and i am not able to access network file for the same , only able to see simulations?
In the currently released version you only can review a simulation. One point we completely missed prior to the Open Source release,was the exchange and retrieval of networks. If we worked on a simulation project everything was under version control and only the review was needed. For the review you of course retrieve the complete network from the database, you just do not have the option of exporting/saving it. I will add a feature request for this, and see if it can squeezed into the next version, which already addresses other issues surrounding the exchange of simulation projects between different people.
The demo itself is a show case for the device capable of detecting (D)DoS attacks and blocking the attack, and of course showing the effects of a DDoS attack without such devices. Our research activities (not part of the demo) were about the cost effective placement of such device and not the actual attack detection and mitigation.