-
Notifications
You must be signed in to change notification settings - Fork 6
Open
Description
How is this related to https://github.com/hcaseyal/cs244-PA3 ?
Kind of looks like a refactored version. But it also contains differences like a different payload size for packets send as bursts.
https://github.com/hcaseyal/cs244-PA3/blob/master/shrew.py#L20 has 1500 bytes payload which I assume would lead to TWO IP fragments per UDP datagram. In this repo first 1000 zeros are created as data (https://github.com/hotpxl/low-rate-tcp-targeted-dos-attacks/blob/master/run_attacker.py#L39). But, these are never used and instead 128 zeros are send as payload which I assume will only lead to ONE IP fragment.
And I try to run it but cannot get it work. Unfortunately I don't have gcloud. I try with a Ubuntu 18.x VM, but am stuck at this AssertionError.
root@ubuntu-4gb-nbg1-1:~/low-rate-tcp-targeted-dos-attacks# ./run.sh
Run 20211109-150039 on ubuntu-4gb-nbg1-1 (162.55.214.148) started.
python: no process found
dd: no process found
tshark: no process found
dumpcap: no process found
Starting attack, burst=0.15, period=0.50
Alice's IP is 10.0.0.1.
Bob's IP is 10.0.0.2.
Mallory's IP is 10.0.0.3.
UDP attack started from 10.0.0.3 to 10.0.0.2.
Starting receiver on 10.0.0.2.
Starting sender on 10.0.0.1.
TCP flow started on Alice and Bob.
Traceback (most recent call last):
File "dos.py", line 153, in <module>
main()
File "dos.py", line 143, in main
t = run_flow(net, cwnd_file=cwnd_file)
File "dos.py", line 74, in run_flow
assert c.wait() == 0
AssertionError
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels