Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Selective Forwarding Attack #35

Open
yss8166 opened this issue Feb 19, 2018 · 10 comments
Open

Selective Forwarding Attack #35

yss8166 opened this issue Feb 19, 2018 · 10 comments

Comments

@yss8166
Copy link

yss8166 commented Feb 19, 2018

hi,

i have sent you an email regarding selective forwarding attack . can you please check it

@dhondta dhondta changed the title selective forwording attack Selective Forwarding Attack Mar 3, 2018
@kurban2015
Copy link

Dear All,
I am MSc CS student and i need RPL Attacks source code based on Contiki/Cooja simulaor.
I have to sumbit my thesis and i am unable to find source code files of RPL attacks.
Please help me to find out code files. Its an honor for me if anyone please give me source code files.

Regards,
Muhammad Naeem
Email: [email protected]

@dhondta
Copy link
Owner

dhondta commented Aug 15, 2019

Hi @kurban2015
I'm not sure to fully understand your request ; I suppose you mean the source code files related to the RPL library of Contiki ?
I suggest you to check this documentation page to get started with the JSON configuration of attack building blocks using the RPL-Attacks framework for tuning ContikiRPL. In particular, the source code files of RPL are located at [CONTIKI_FOLDER]/core/net/rpl/.
Does it answer your question ?

@kurban2015
Copy link

kurban2015 commented Aug 15, 2019 via email

@dhondta
Copy link
Owner

dhondta commented Aug 15, 2019

@kurban2015 What do you mean when you say "source code files" ?...

@kurban2015
Copy link

kurban2015 commented Aug 15, 2019 via email

@dhondta
Copy link
Owner

dhondta commented Aug 15, 2019

@kurban2015 Every related files is saved in your ~/Experiments folder under the name of your experiment, including .csc and its .js, and so forth.

@dhondta
Copy link
Owner

dhondta commented Aug 16, 2019

@kurban2015 OK, my mistake, I see what you mean. Attacks are implemented with the building blocks and used in the experiments to generate .csc files. If you don't find the wormhole and grayhole attacks in the building blocks, then it means that there aren't developed yet.
So, to answer your previous question : I don't have any .csc file for these attacks as the related building blocks don't exist yet.

@Carla-33
Copy link

Hi All,
II need AODV Attacks code based on scikit-learn simulator using Naive Bayes classifiers. The kinds attack that I have been used are blackhole and selective forwarding.
Please help me to find out code. Its an honor for me if anyone please give me source code files.

Regards,

@truptipithva
Copy link

truptipithva commented Jan 29, 2022 via email

@Carla-33
Copy link

Sure . If I have solution then I will definitely inform you soon.

On Sat, 29 Jan 2022, 03:45 Carla-33, @.> wrote: Hi All, II need AODV Attacks code based on scikit-learn simulator using Naive Bayes classifiers. The kinds attack that I have been used are blackhole and selective forwarding. Please help me to find out code. Its an honor for me if anyone please give me source code files. Regards, — Reply to this email directly, view it on GitHub <#35 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/AOP66LGT4VRMKL43OZWSDY3UYMIQVANCNFSM4ERIA6FQ . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub. You are receiving this because you commented.Message ID: @.>

Okay, thank a lot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants