Code Monkey home page Code Monkey logo

dns-anomaly-injection's Introduction

DNS Attack Simulator

For running the attack, all the attack have this same input (some optional) variables:

  • The direction and name of the .pcap file that is going to be modified (the input file) must be submitted by the parameter --input_file or it's shortcut -i.

    • For example -i /path/to/file/myFile.pcap
  • The direction of the output file and it's name which is going to be created with the attacks on it must be submitted by the argument --output_file or -o. The directory path have to exist.

    • Example -o /path/to/output/outFile.pcap
  • For submiting the duration of the attack, use the --duration and then the time (in seconds). The default value of this parameter is 60 seconds.

  • The number of computers on the botnet can be setted by the parameter --num_zombies or the shortcut -z. The value that is setted by default is 1, hence the type of the attack by default is a DOS.

  • The initial time of the attack, which is measured in order of the initial time of the first packet of the input file, can be submitted by the argument --initial_time (or -it). This is measure in seconds and it's default value is 0.

  • The number of packets to send during each second of the attack (the rate of packets per second) is setted by the argument --num_packet or -n. The default value it's determined by the attack to simulate.

  • On the other side, the size of the time window to establish the tolerance of the server is established by the argument --window_size, or either way -w it's the shortcut for this argument. This is measured in seconds and it's default is 0.01

  • On a same way, the number of query packets that the server can generate it's responses on the time window defined. This argument is being set by the command -p or --packets_per_window, and the default value is 100 packet per window.

    • For example if the window is 0.001 seconds, and the -p is 10, then it's interpretation is 10 packets per 0.001 seconds.
  • In the IP direction of the server that is going to be attacked on the simulation, now this can be set by the argument --server_ip or -s. The default value is the DNS server of blanco that it's IP is 200.7.4.7

  • The original port of the queries, that can be set by the argument -source_port and it's shortcut -sp. Some attack may not have it.

Port scanning special arguments

For the port scanning attacks, there are some additional arguments to submit at the moment of doing a simulation.

TCP SYN scanning and Udp scanning

For this port scanning are this common arguments:

  • An initial port to scan given by the -initial_port or it's shortcut -ip. By default it's value is 0

  • The final port to scan, which can be set by the argument -final_port or -fp, with default value 40000

  • An port stamp to investigate that can be set by -inter_port or -inp, with default value of 1 port.

  • The number of open and closed ports can be established by the arguments -open_port or -op for the open ports and -closed_port or -cp for the closed ones. They do not have a default value.

Udp Flood arguments

  • The ip direction of the source of the attack can be set by the argument -src_ip or -sip. By default is an random one.

  • To limit the number of responses of ICMP type per second can be activated by the command -activate_icmp_limit or -al and to establish the number of ICMP responses by second with the argument -icmp_limit or -il. The value by default is 2.

  • All the extra arguments are the same of port scanning described before.

More Port scanning arguments

  • For the source ip on the one domain scanning you can establish by putting the argument --src_ip or the -sip

  • The udp port scanning, receive also all the arguments of the udp flood attack.

  • The tcp syn port scanning in addition receive first extra argument of the udp flood attack.

dns-anomaly-injection's People

Contributors

joacocruz6 avatar valeriavaldes avatar javi801 avatar lareyes2 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.