Skip to content

cs244-PA3 #1

@shoeper

Description

@shoeper

How is this related to https://github.com/hcaseyal/cs244-PA3 ?

Kind of looks like a refactored version. But it also contains differences like a different payload size for packets send as bursts.

https://github.com/hcaseyal/cs244-PA3/blob/master/shrew.py#L20 has 1500 bytes payload which I assume would lead to TWO IP fragments per UDP datagram. In this repo first 1000 zeros are created as data (https://github.com/hotpxl/low-rate-tcp-targeted-dos-attacks/blob/master/run_attacker.py#L39). But, these are never used and instead 128 zeros are send as payload which I assume will only lead to ONE IP fragment.

And I try to run it but cannot get it work. Unfortunately I don't have gcloud. I try with a Ubuntu 18.x VM, but am stuck at this AssertionError.

root@ubuntu-4gb-nbg1-1:~/low-rate-tcp-targeted-dos-attacks# ./run.sh 
Run 20211109-150039 on ubuntu-4gb-nbg1-1 (162.55.214.148) started.
python: no process found
dd: no process found
tshark: no process found
dumpcap: no process found

Starting attack, burst=0.15, period=0.50
Alice's IP is 10.0.0.1.
Bob's IP is 10.0.0.2.
Mallory's IP is 10.0.0.3.

UDP attack started from 10.0.0.3 to 10.0.0.2.
Starting receiver on 10.0.0.2.
Starting sender on 10.0.0.1.
TCP flow started on Alice and Bob.
Traceback (most recent call last):
  File "dos.py", line 153, in <module>
    main()
  File "dos.py", line 143, in main
    t = run_flow(net, cwnd_file=cwnd_file)
  File "dos.py", line 74, in run_flow
    assert c.wait() == 0
AssertionError

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions