Coder Social home page Coder Social logo

feniel / netattacks_v1 Goto Github PK

View Code? Open in Web Editor NEW
0.0 1.0 0.0 23.13 MB

NETA v1.0 with implemented routing attack scenarios and countermeasures under aodv

License: GNU General Public License v3.0

Makefile 10.10% C++ 78.87% Shell 0.04% C 10.77% Objective-C 0.22%
manet aodv attack-defense simulation-framework

netattacks_v1's Introduction

netattacks_v1

extended Roberto Magán's framework (https://github.com/robertomagan/neta_v1) with some of the most common attacks against routing.
In addition, defensive measures for the respective attack scenarios are also included.

For the implementation omnetpp-4.3 and inet2.1.0 is used.

Blackhole Attack
An attack similar to the sinkhole attack, but it does not exploit a routing loop, but distributes false information in the network.
Countermeasures: SAODV(Only the RREP Buffer), Fake RREQ

Flooding Attack
The network is flooded with RREQ so that normal operation is no longer possible.
Countermeasures: Policy Based Filtering, Flow Based Filtering

NETA Description

NETwork Attacks (NETA) is a framework devised to simulate attacks in heterogeneous networks using OMNeT++. NETA is aimed to be an useful tool in the network security field. This tool could make easy to demonstrate the effectiveness of defense security techniques or solutions against network attacks as well as for comparing the capabilities of different defense techniques. NETA is a INET 2.1.0 based framework. INET provides realistic implementations of structures and protocols on each protocol layers, especially in the higher ones: network, transport and application layers. For example, INET develops Mobile Ad-hoc NETworks (MANETs) routing protocols as AODV, DSR, OLSR, etc., and several TCP implementations as well as several applications. Thanks to the versatile and extensible schema of NETA, a huge amount attacks could be implemented in each protocol layer.

Additionally, NETA is intended to be a reference base tool for the network attacks simulation and implementation with research purposes.

NETA Installation

See INSTALL file.

Documentation

All documentation can be found in the doc directory. Also you can found there the user and description manual. The additional attacks are inserted according to the scheme described there.

The defensive measures are inserted as an attribute of the manetrouting. Consequently, they must be set with bools in the simulation configurations.

netattacks_v1's People

Contributors

feniel avatar

Watchers

 avatar

netattacks_v1's Issues

A simulation analysis of black hole and selective forwarding attack in aovd using NS-3

Hi
I need the simulation of Blackhole and Selective forwarding attack module in ns3 using modified AODV and SAODV. Also, it must measure some of the matrices such as energy consumption, throughput, packet delivery ratio, end to end delay, precision, accuracy , recall and time overhead.

If you know any open source code to apply this, please let me know.
I need to run this code and see the result between the AODV and SAODV.

Please help me.

Thank you

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.