Name | Type | Description |
---|---|---|
NA_NetworkLayer | compound module |
Compound module allowing hacked modules. Modificated from NetworkLayer module. |
// // Copyright (C) 2004 Andras Varga // Copyright (C) 2000 Institut fuer Telematik, Universitaet Karlsruhe // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU Lesser General Public License // as published by the Free Software Foundation; either version 2 // of the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Lesser General Public License for more details. // // You should have received a copy of the GNU Lesser General Public License // along with this program; if not, see <http://www.gnu.org/licenses/>. // // // Copyright (C) 2013 and modified by NESG (Network Engineering and Security Group), http://nesg.ugr.es, // - Gabriel Maciá Fernández (gmacia@ugr.es) // - Leovigildo Sánchez Casado (sancale@ugr.es) // - Rafael A. Rodríguez Gómez (rodgom@ugr.es) // - Roberto Magán Carrión (rmagan@ugr.es) // - Pedro García Teodoro (pgteodor@ugr.es) // - José Camacho Páez (josecamacho@ugr.es) // - Jesús E. Díaz Verdejo (jedv@ugr.es) // package nesg.netattacks.hackedmodules.networklayer; import inet.nodes.inet.NetworkLayer; import inet.networklayer.ipv4.IPv4; import inet.networklayer.ipv4.IIGMP; import inet.networklayer.ipv4.ICMP; import inet.networklayer.ipv4.ErrorHandling; import inet.networklayer.arp.ARP; import nesg.netattacks.hackedmodules.networklayer.ipv4.NA_IPv4; // // Compound module allowing hacked modules. Modificated from NetworkLayer module. // // Allowed hacked modules: // - NA_IPv4 // // @see NA_IPv4, IPv4 // // @author Gabriel Maciá Fernández, gmacia@ugr.es // @date 01/22/2013 module NA_NetworkLayer { parameters: @display("i=block/fork,red;i2=status/excl3"); bool proxyARP = default(true); string igmpType = default("IGMPv2"); gates: input ifIn[] @labels(IPv4Datagram); input tcpIn @labels(TCPSegment,IPv4ControlInfo/down); input udpIn @labels(UDPPacket,IPv4ControlInfo/down); input sctpIn @labels(IPv4ControlInfo/down,SCTPPacket); input rsvpIn @labels(IPv4ControlInfo/down); input ospfIn @labels(IPv4ControlInfo/down); input pingIn[]; input manetIn; output ifOut[] @labels(IPv4Datagram); output tcpOut @labels(TCPSegment,IPv4ControlInfo/up); output udpOut @labels(UDPPacket,IPv4ControlInfo/up); output sctpOut @labels(IPv4ControlInfo/up,SCTPPacket); output rsvpOut @labels(IPv4ControlInfo/up); output ospfOut @labels(IPv4ControlInfo/up); output pingOut[]; output manetOut; submodules: //# Hacked module replacing the normal IPv4 INET module for attack purposes. ip: NA_IPv4 { parameters: protocolMapping = "6:0,17:1,1:2,2:3,46:4,89:5,132:6,48:7,138:7"; // see: http://www.iana.org/assignments/protocol-numbers @display("p=85,95;q=queue"); gates: transportIn[8]; transportOut[8]; queueIn[sizeof(ifIn)]; } arp: ARP { parameters: proxyARP = proxyARP; @display("p=202,142;q=pendingQueue"); gates: nicOut[sizeof(ifOut)]; } icmp: ICMP { parameters: @display("p=160,63"); } igmp: <igmpType> like IIGMP { parameters: @display("p=39,33"); } errorHandling: ErrorHandling { parameters: @display("p=239,63"); } connections allowunconnected: // transport Layer ip.transportOut[0] --> { @display("m=n"); } --> tcpOut; ip.transportIn[0] <-- { @display("m=n"); } <-- tcpIn; ip.transportOut[1] --> { @display("m=n"); } --> udpOut; ip.transportIn[1] <-- { @display("m=n"); } <-- udpIn; ip.transportOut[2] --> icmp.localIn; ip.transportIn[2] <-- icmp.sendOut; ip.transportOut[3] --> igmp.ipIn; ip.transportIn[3] <-- igmp.ipOut; ip.transportOut[4] --> { @display("m=n"); } --> rsvpOut; ip.transportIn[4] <-- { @display("m=n"); } <-- rsvpIn; ip.transportOut[5] --> { @display("m=n"); } --> ospfOut; ip.transportIn[5] <-- { @display("m=n"); } <-- ospfIn; ip.transportOut[6] --> { @display("m=n"); } --> sctpOut; ip.transportIn[6] <-- { @display("m=n"); } <-- sctpIn; ip.transportOut[7] --> { @display("m=n"); } --> manetOut; ip.transportIn[7] <-- { @display("m=n"); } <-- manetIn; for i=0..sizeof(pingOut)-1 { icmp.pingOut++ --> { @display("m=n"); } --> pingOut[i]; } for i=0..sizeof(pingIn)-1 { icmp.pingIn++ <-- { @display("m=n"); } <-- pingIn[i]; } icmp.errorOut --> errorHandling.in; ip.queueOut --> arp.ipIn; for i=0..sizeof(ifIn)-1 { ifIn[i] --> { @display("m=s"); } --> ip.queueIn[i]; } for i=0..sizeof(ifOut)-1 { arp.nicOut[i] --> { @display("m=s"); } --> ifOut[i]; } }