Next: The DoS Attack Simulation
Up: The RAT Software
Previous: The RAT Software
  Contents
The first step to use the RAT system is the installation of the Linux-rat-2.6.10 operational system in all network routers. The next step is the RATd installation. This tool must be installed, configured and initialized in each router. This initial procedure must be done only one time. After that, all packets will be automatically marked and the route reconstruction process will be started whenever the user requires. After the system installation, the DoS attack simulation tool can be used to generate an attack packet. Then the sent packet will cross through the network and each traversed router will insert its IP address in the Generalized Bloom Filter integrated into the packet header. When receiving the attack packet, the RATd (running in the victim) will initialize the route reconstruction. At the end of the process, the real packet source and the attack route will be informed to the user.
Grupo de Teleinformática e Automação (GTA/UFRJ)