-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a framework to simulate attacks on PoCR network #17
Comments
In GitLab by @sjehanfinaxys on Apr 26, 2022, 15:30 unassigned @sjehanfinaxys |
In GitLab by @sjehanfinaxys on May 5, 2022, 14:54 @EricPradeau @guenoledc In this framework, we don't deal with Solidity attack that can be handled by The best attack (less manageable for the defense) would combine the 3 in an unpredictable manner. To automate we have (after a deep investigation of the network stack of ethereum) found toxiproxy to be put as a proxy on every single POCR node. Then, Apache Airflow is used to automate distributed tests.
A list of attacks to be tested in Apache Airflow DAGs need to be defined. THose are a) Pure network attack b) Geth attack - ETH protocol All a) and b) attacks are here to isolate / put down a node. Some pure Devops mitigation have to be designed: c) CLique attack d) Block minining attack We also want to configure Wireshard Ethereum dissectors https://media.consensys.net/releasing-wireshark-dissectors-for-ethereum-%C3%B0%CE%BEvp2p-protocols-215c9656dd9c in order to audit packets - DEVP2P creates its own packet formats. Unforunately this is not maintained by Consensys anymore. This attack list, automated, needs to be accepted first before we get fully automating it. |
Hi @sjehanfinaxys I am impressed, ... and lost on this subject and I really need a presentation. I have left these subject on the side for long now. Can we schedule an afternoon work on this, possibly with @vincent_fin also. can you try to schedule this a Friday afternoon (via @EricPradeau ) where I have more time generally
|
In GitLab by @sjehanfinaxys on Apr 26, 2022, 15:29
Using a programmable HAProxy on Minikube, simulate network attack.
Link the network attack with malicious actions from sealers (type 2 and 3 attacks)
The text was updated successfully, but these errors were encountered: