$ ./id2t -i pcap/IoT-Oct-12.pcap --output pcap/IoT-Oct-12.pcap -a DDoS attackers.count=100 -r
Input file: pcap/IoT-Oct-12.pcap
Located statistics database at: /home/xtikka/.cache/id2t/db/207/23/badd947ccfae.sqlite3
Flag -r/--recalculate found. Recalculating statistics.
There are 1 interval statistics table(s) in the database:
ID | interval in seconds | is_default
0 | 511.673673 | 1
Do you want to recalculate them as well? (y)es|(n)o|(d)elete: y
The old interval statistics will be recalculated.
Loading pcap...
Inspected packets: 100.0% (3591404/3591404)
Unrecognized PDUs detected: Check 'unrecognized_pdus' table!
New database has been generated, printing statistics summary...
PCAP FILE STATISTICS SUMMARY ------------------------------
Total packet count: 3590997 packets
Recognized packets: 3425089 packets
Unrecognized packets: 165908 PDUs
% Recognized packets: 95.3799 %
% Unrecognized packets: 4.6201 %
Last unknown PDU: 2016-10-12 03:12:49.847621
Capture duration: 51167.3672 seconds
------------------------------------------------------------
No user specified interval found. Using default interval: 511.673673s
Loaded file statistics in 35.9 sec by PCAP file processor.
Creating attack instance of DDoSAttack
Validating and adding attack parameters.
Generating attack packets... Traceback (most recent call last):
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 224, in <module>
main(sys.argv[1:])
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 219, in main
cli.parse_arguments(args)
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 104, in parse_arguments
self.process_arguments()
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 115, in process_arguments
self.process_pcap()
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 201, in process_pcap
controller.process_attacks(self.args.attack, self.args.rngSeed, self.args.time, self.args.inject_empty)
File "/home/xtikka/workspaces/id2t/code/Core/Controller.py", line 100, in process_attacks
temp_attack_pcap, duration = self.attack_controller.process_attack(attack[0], attack[1:], measure_time)
File "/home/xtikka/workspaces/id2t/code/Core/AttackController.py", line 176, in process_attack
self.current_attack.generate_attack_packets()
File "/home/xtikka/workspaces/id2t/code/Attack/DDoSAttack.py", line 196, in generate_attack_packets
timestamp_next_pkt = rnd.uniform(timestamp_next_pkt, Util.update_timestamp(timestamp_next_pkt, attacker_pps))
File "/home/xtikka/workspaces/id2t/code/ID2TLib/Utility.py", line 62, in update_timestamp
random_delay = lea.Lea.fromValFreqsDict({1 / pps: 70, 2 / pps: 20, 5 / pps: 7, 10 / pps: 3})
ZeroDivisionError: float division by zero
Pcap can be obtained here: https://iotanalytics.unsw.edu.au/iotFiles/16-10-12.pcap
Trace:
$ ./id2t -i pcap/IoT-Oct-12.pcap --output pcap/IoT-Oct-12.pcap -a DDoS attackers.count=100 -r
Input file: pcap/IoT-Oct-12.pcap
Located statistics database at: /home/xtikka/.cache/id2t/db/207/23/badd947ccfae.sqlite3
Flag -r/--recalculate found. Recalculating statistics.
There are 1 interval statistics table(s) in the database:
ID | interval in seconds | is_default
0 | 511.673673 | 1
Do you want to recalculate them as well? (y)es|(n)o|(d)elete: y
The old interval statistics will be recalculated.
Loading pcap...
Inspected packets: 100.0% (3591404/3591404)
Unrecognized PDUs detected: Check 'unrecognized_pdus' table!
New database has been generated, printing statistics summary...
PCAP FILE STATISTICS SUMMARY ------------------------------
Total packet count: 3590997 packets
Recognized packets: 3425089 packets
Unrecognized packets: 165908 PDUs
% Recognized packets: 95.3799 %
% Unrecognized packets: 4.6201 %
Last unknown PDU: 2016-10-12 03:12:49.847621
Capture duration: 51167.3672 seconds
------------------------------------------------------------
No user specified interval found. Using default interval: 511.673673s
Loaded file statistics in 35.9 sec by PCAP file processor.
Creating attack instance of DDoSAttack
Validating and adding attack parameters.
Generating attack packets... Traceback (most recent call last):
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 224, in <module>
main(sys.argv[1:])
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 219, in main
cli.parse_arguments(args)
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 104, in parse_arguments
self.process_arguments()
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 115, in process_arguments
self.process_pcap()
File "/home/xtikka/workspaces/id2t/code/CLI.py", line 201, in process_pcap
controller.process_attacks(self.args.attack, self.args.rngSeed, self.args.time, self.args.inject_empty)
File "/home/xtikka/workspaces/id2t/code/Core/Controller.py", line 100, in process_attacks
temp_attack_pcap, duration = self.attack_controller.process_attack(attack[0], attack[1:], measure_time)
File "/home/xtikka/workspaces/id2t/code/Core/AttackController.py", line 176, in process_attack
self.current_attack.generate_attack_packets()
File "/home/xtikka/workspaces/id2t/code/Attack/DDoSAttack.py", line 196, in generate_attack_packets
timestamp_next_pkt = rnd.uniform(timestamp_next_pkt, Util.update_timestamp(timestamp_next_pkt, attacker_pps))
File "/home/xtikka/workspaces/id2t/code/ID2TLib/Utility.py", line 62, in update_timestamp
random_delay = lea.Lea.fromValFreqsDict({1 / pps: 70, 2 / pps: 20, 5 / pps: 7, 10 / pps: 3})
ZeroDivisionError: float division by zero
Pcap can be obtained here: https://iotanalytics.unsw.edu.au/iotFiles/16-10-12.pcap
Trace: