def test__update_twotupleuni_update(): afg = AnubisFG(bidirectional=False) capture = rdpcap('tests/data/test_100_rows.pcap') # Second packet is a SYN TCP packet. packet = capture[1] ip_src = '172.16.0.5' ip_dst = '192.168.50.1' timestamp = datetime(2018, 12, 1, 13, 17, 11, 183810) src_port = 60675 dst_port = 80 protocol = 6 hdr_len = 20 length = 74 ttl = 63 pkt_flag_counter = [0] * 8 # SYN flag pkt_flag_counter[1] = 1 # Creating afg._update_twotupleuni(packet) expected = { 'fst_timestamp': timestamp, 'lst_timestamp': timestamp, 'set_src_ports': {src_port}, 'set_dst_ports': {dst_port}, 'pkt_flag_counter': pkt_flag_counter, 'pkt_protocol_counter': { protocol: 1 }, 'tot_header_len': hdr_len, 'tot_packet_len': length, 'tot_ttl': ttl } assert len(afg.memory_twotup) == 1 assert afg.memory_twotup[(ip_src, ip_dst)].__dict__ == expected # Updating # Third packet is another SYN TCP packet with same IPs and Ports packet = capture[2] new_timestamp = datetime(2018, 12, 1, 13, 17, 11, 183813) # SYN flag pkt_flag_counter[1] += 1 afg._update_twotupleuni(packet) expected = { 'fst_timestamp': timestamp, 'lst_timestamp': new_timestamp, 'set_src_ports': {src_port}, 'set_dst_ports': {dst_port}, 'pkt_flag_counter': pkt_flag_counter, 'pkt_protocol_counter': { protocol: 2 }, 'tot_header_len': hdr_len * 2, 'tot_packet_len': length * 2, 'tot_ttl': ttl * 2 } assert len(afg.memory_twotup) == 1 assert afg.memory_twotup[(ip_src, ip_dst)].__dict__ == expected
def test__update_twotupleuni_noupdate(): afg = AnubisFG(bidirectional=False) capture = rdpcap('tests/data/test_100_rows.pcap') # First packet is a STP packet that should not be read. packet = capture[0] afg._update_twotupleuni(packet) assert afg.memory_twotup == dict() with pytest.raises(IndexError, match='Packet does not have an IP layer'): afg._update_twotupleuni(packet, ignore_errors=False)
def test_update(): capture = rdpcap('tests/data/test_100_rows.pcap') # Will be tested considering all possible sets of attributes. for bidir in [True, False]: for onlytwo in [True, False]: for onlyfive in set([not onlytwo, False]): # This will be updated by the method update. afg_1 = AnubisFG(bidirectional=bidir, only_twotuple=onlytwo, only_fivetuple=onlyfive) # This will be updated by the specific method(s) tested above. afg_2 = AnubisFG(bidirectional=bidir, only_twotuple=onlytwo, only_fivetuple=onlyfive) for i in range(1, 4): packet = capture[i] afg_1.update(packet) assert afg_1.lst_timestamp == datetime.utcfromtimestamp( packet.time) if bidir: if onlytwo: afg_2._update_twotuplebi(packet) elif onlyfive: afg_2._update_fivetuplebi(packet) else: afg_2._update_twotuplebi(packet) afg_2._update_fivetuplebi(packet) else: if onlytwo: afg_2._update_twotupleuni(packet) elif onlyfive: afg_2._update_fivetupleuni(packet) else: afg_2._update_twotupleuni(packet) afg_2._update_fivetupleuni(packet) if afg_1.memory_twotup is None: assert afg_2.memory_twotup is None else: assert afg_1.memory_twotup.keys( ) == afg_2.memory_twotup.keys() for key in afg_1.memory_twotup.keys(): assert afg_1.memory_twotup[ key].__dict__ == afg_2.memory_twotup[ key].__dict__ if afg_1.memory_fivetup is None: assert afg_2.memory_fivetup is None else: assert afg_1.memory_fivetup.keys( ) == afg_2.memory_fivetup.keys() for key in afg_1.memory_fivetup.keys(): assert afg_1.memory_fivetup[ key].__dict__ == afg_2.memory_fivetup[ key].__dict__
def test__generate_features_twotupleuni(): ''' Feature list: qt_pkt qt_pkt_tcp qt_pkt_udp qt_pkt_icmp qt_pkt_ip qt_prtcl qt_src_prt qt_dst_prt qt_fin_fl qt_syn_fl qt_res_fl qt_psh_fl qt_ack_fl qt_urg_fl qt_ecn_fl qt_cwr_fl avg_hdr_len avg_pkt_len frq_pkt avg_ttl tm_dur_s ''' n_features = 21 ip_src = '172.16.0.5' ip_dst = '192.168.50.1' key = (ip_src, ip_dst) afg = AnubisFG(bidirectional=False) # Tuple that is not on the memory. empty = afg._generate_features_twotupleuni(key) assert empty == [0] * n_features # Duration 0 capture = rdpcap('tests/data/test_100_rows.pcap') # Second packet is a SYN TCP packet. packet = capture[1] timestamp = datetime(2018, 12, 1, 13, 17, 11, 183810) afg._update_twotupleuni(packet) expected = [ 1, # qt_pkt 1, # qt_pkt_tcp 0, # qt_pkt_udp 0, # qt_pkt_icmp 0, # qt_pkt_ip 1, # qt_prtcl 1, # qt_src_prt 1, # qt_dst_prt 0, # qt_fin_fl 1, # qt_syn_fl 0, # qt_res_fl 0, # qt_psh_fl 0, # qt_ack_fl 0, # qt_urg_fl 0, # qt_ecn_fl 0, # qt_cwr_fl 20, # avg_hdr_len 74, # avg_pkt_len 1, # frq_pkt 63, # avg_ttl 0, # tm_dur_s ] ftrs = afg._generate_features_twotupleuni(key) assert ftrs == expected # Duration > 0 # Updating # Third packet is another SYN TCP packet with same IPs and Ports packet = capture[2] afg._update_twotupleuni(packet) new_timestamp = datetime(2018, 12, 1, 13, 17, 11, 183813) dur = (new_timestamp - timestamp).total_seconds() expected = [ 2, # qt_pkt 2, # qt_pkt_tcp 0, # qt_pkt_udp 0, # qt_pkt_icmp 0, # qt_pkt_ip 1, # qt_prtcl 1, # qt_src_prt 1, # qt_dst_prt 0, # qt_fin_fl 2, # qt_syn_fl 0, # qt_res_fl 0, # qt_psh_fl 0, # qt_ack_fl 0, # qt_urg_fl 0, # qt_ecn_fl 0, # qt_cwr_fl 20, # avg_hdr_len 74, # avg_pkt_len 2 / dur, # frq_pkt 63, # avg_ttl dur, # tm_dur_s ] ftrs = afg._generate_features_twotupleuni(key) assert ftrs == expected # Using now datetime. new_timestamp = datetime.now() dur = (new_timestamp - timestamp).total_seconds() expected = [ 2, # qt_pkt 2, # qt_pkt_tcp 0, # qt_pkt_udp 0, # qt_pkt_icmp 0, # qt_pkt_ip 1, # qt_prtcl 1, # qt_src_prt 1, # qt_dst_prt 0, # qt_fin_fl 2, # qt_syn_fl 0, # qt_res_fl 0, # qt_psh_fl 0, # qt_ack_fl 0, # qt_urg_fl 0, # qt_ecn_fl 0, # qt_cwr_fl 20, # avg_hdr_len 74, # avg_pkt_len 2 / dur, # frq_pkt 63, # avg_ttl dur, # tm_dur_s ] ftrs = afg._generate_features_twotupleuni(key, now=True) assert np.isclose(ftrs, expected).all() # Zero forward packets on existing flow ip_src_1 = '192.168.0.1' ip_dst_1 = '192.168.0.2' key_1 = (ip_src_1, ip_dst_1) t2_1 = TwoTupleUnidirectionalNode() memory_twotup_1 = {key_1: t2_1} afg_1 = AnubisFG(memory_twotup=memory_twotup_1, bidirectional=False) ftrs = afg_1._generate_features_twotupleuni(key_1) assert ftrs == [0] * n_features