|
| 1 | +# -*- coding: utf-8 -*- |
| 2 | +import unittest |
| 3 | +from securetea.lib.ids.r2l_rules.bgp_abuse import BGP_Abuse |
| 4 | +import scapy.all as scapy |
| 5 | +from securetea.logger import SecureTeaLogger |
| 6 | + |
| 7 | +try: |
| 8 | + # if python 3.x.x |
| 9 | + from unittest.mock import patch |
| 10 | +except ImportError: # python 2.x.x |
| 11 | + from mock import patch |
| 12 | + |
| 13 | + |
| 14 | +class TestBGP_Abuse(unittest.TestCase): |
| 15 | + """ |
| 16 | + Test class for SecureTea IDS BGP_Abuse Detection. |
| 17 | + """ |
| 18 | + |
| 19 | + def setUp(self): |
| 20 | + """ |
| 21 | + Setup class for BGP_Abuse. |
| 22 | + """ |
| 23 | + # Create scapy packet (valid attack) |
| 24 | + self.pkt = scapy.IP(src="10.0.2.15", |
| 25 | + dst="200.10.10.1") \ |
| 26 | + / scapy.TCP(dport=53, sport=179, flags="RA", seq=123, ack=456) |
| 27 | + |
| 28 | + # Create a scapy packet (invalid attack) |
| 29 | + self.pkt2 = scapy.IP(src="10.0.2.15", |
| 30 | + dst="200.10.10.1") \ |
| 31 | + / scapy.TCP(dport=53, sport=179, seq=123, ack=456) |
| 32 | + |
| 33 | + # Create BGP Abuse object |
| 34 | + self.bgp_abuse_obj = BGP_Abuse() |
| 35 | + |
| 36 | + @patch.object(SecureTeaLogger, 'log') |
| 37 | + def test_detect_bgp_abuse(self, mock_log): |
| 38 | + """ |
| 39 | + Test detect_bgp_abuse. |
| 40 | + """ |
| 41 | + # Case 1: When condition for bgp abuse is invalid |
| 42 | + self.bgp_abuse_obj.detect_bgp_abuse(self.pkt2) |
| 43 | + self.assertFalse(mock_log.called) |
| 44 | + |
| 45 | + # Case 2: When condition for bgp abuse is valid |
| 46 | + self.bgp_abuse_obj.detect_bgp_abuse(self.pkt) |
| 47 | + mock_log.assert_called_with("Possible BGP Abuse,Blind Disruption attack detected.", |
| 48 | + logtype="warning") |
0 commit comments