idip_firewall_receiver.c: Waiting for incoming idip messages on firewall idip_message_receiver: sizeof idip_message_t 2232 idip_message_receiver: n bytes received :2232 idip_message_receiver: message received: spp_flood 101 :rate FLOOD DETECTED from 192.168.11.190/24 (THRESHOLD 100 connections exceeded in 0 seconds) idip_message_receiver: received idip_message packet idip_firewall_receiver.c do_trace_request: thishost is r991 received message spp_flood 101 :rate FLOOD DETECTED from 192.168.11.190/24 (THRESHOLD 100 connections exceeded in 0 seconds) threshold packets 100 cmd = sh tcpdump.sh 100 3 idip_firewall_receiver.c do_trace_request: UNDER ATTACK: idip_firewall_receiver.c do_trace_request: from source 192.168.11.187 idip_firewall_receiver.c do_trace_request: on interface eth0 idip_firewall_receiver.c do_trace_request: number of packets 806 idip_firewall_receiver.c do_trace_request: Reading topo.txt file idip_firewall_receiver.c do_trace_request: Line from topo.txt file read eth0 192.168.12.97 idip_firewall_receiver.c do_trace_request: Found interface in topo file idip_firewall_receiver.c do_trace_request: interface eth0 has router 192.168.12.97 alertmsg after sprintf FLOOD DETECTED on r991 from 192.168.11.187 (THRESHOLD 100 connections exceeded in 10 seconds) In create_app_msg, type 46 idip_firewall_receiver.c do_request: message received FLOOD DETECTED on r991 from 192.168.11.187 (THRESHOLD 100 connections exceeded in 10 seconds) idip_firewall_receiver.c do_request: Connected to rate limiter idip_firewall_receiver.c do_request: Sent msg FLOOD DETECTED on r991 from 192.168.11.187 (THRESHOLD 100 connections exceeded in 10 seconds) to rate limiter idip_firewall_receiver.c do_trace_request: alertmsg sent to 192.168.12.97: FLOOD DETECTED on r991 from 192.168.11.187 (THRESHOLD 100 connections exceeded in 10 seconds) idip_firewall_receiver.c do_trace_request: Line from topo.txt file read eth3 192.168.14.102 idip_firewall_receiver.c do_trace_request : Checking for other upstream routers to notify idip_firewall_receiver.c do_trace_request: line read from topo file eth3 192.168.14.102 In create_app_msg, type 46 idip_firewall_receiver.c do_trace_request(): alertmsg sent to 192.168.14.102: FLOOD DETECTED on r991 from 192.168.11.187 (THRESHOLD 100 connections exceeded in 10 seconds) idip_firewall_receiver.c do_trace_request: UNDER ATTACK: idip_firewall_receiver.c do_trace_request: from source 192.168.11.198 idip_firewall_receiver.c do_trace_request: on interface eth0 idip_firewall_receiver.c do_trace_request: number of packets 1356 idip_firewall_receiver.c do_trace_request: Reading topo.txt file idip_firewall_receiver.c do_trace_request: Line from topo.txt file read eth0 192.168.12.97 idip_firewall_receiver.c do_trace_request: Found interface in topo file idip_firewall_receiver.c do_trace_request: interface eth0 has router 192.168.12.97 alertmsg after sprintf FLOOD DETECTED on r991 from 192.168.11.198 (THRESHOLD 100 connections exceeded in 10 seconds) In create_app_msg, type 46 idip_firewall_receiver.c do_request: message received FLOOD DETECTED on r991 from 192.168.11.198 (THRESHOLD 100 connections exceeded in 10 seconds) idip_firewall_receiver.c do_request: Connected to rate limiter idip_firewall_receiver.c do_request: Sent msg FLOOD DETECTED on r991 from 192.168.11.198 (THRESHOLD 100 connections exceeded in 10 seconds) to rate limiter idip_firewall_receiver.c do_trace_request: alertmsg sent to 192.168.12.97: FLOOD DETECTED on r991 from 192.168.11.198 (THRESHOLD 100 connections exceeded in 10 seconds) idip_firewall_receiver.c do_trace_request: Line from topo.txt file read eth3 192.168.14.102