12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970 |
- from enum import Enum
- class Parameter(Enum):
- """
- Defines the shortname for attack parameters. The shortname may be used for attack parameter specification
- when calling ID2T via the command line.
- """
- # recommended type: IP address -------------------------------
- IP_SOURCE = 'ip.src' # source IP address
- IP_DESTINATION = 'ip.dst' # destination IP address
- IP_DNS = 'ip.dns' # IP address of DNS server
- # recommended type: MAC address ------------------------------
- MAC_SOURCE = 'mac.src' # MAC address of source
- MAC_DESTINATION = 'mac.dst' # MAC address of destination
- # recommended type: Port -------------------------------------
- PORT_OPEN = 'port.open' # open ports
- PORT_DESTINATION = 'port.dst' # destination ports
- PORT_SOURCE = 'port.src' # source ports
- # recommended type: Integer positive -------------------------
- PACKETS_LIMIT = 'packets.limit'
- NUMBER_ATTACKERS = 'attackers.count'
- ATTACK_DURATION = 'attack.duration' # in seconds
- VICTIM_BUFFER = 'victim.buffer' # in packets
- TARGET_URI = 'target.uri'
- NUMBER_INITIATOR_BOTS = 'bots.count'
- # recommended type: domain -----------------------------------
- TARGET_HOST = 'target.host'
- # recommended type: Float ------------------------------------
- PACKETS_PER_SECOND = 'packets.per-second' # packets per second
- INJECT_AT_TIMESTAMP = 'inject.at-timestamp' # unix epoch time (seconds.millis) where attack should be injected
- # recommended type: Packet Position ----------------------------------
- INJECT_AFTER_PACKET = 'inject.after-pkt' # packet after which attack should be injected
- # recommended type: boolean --------------------------------
- PORT_DEST_SHUFFLE = 'port.dst.shuffle' # shuffles the destination ports if a list of ports is given
- PORT_DEST_ORDER_DESC = 'port.dst.order-desc' # uses a descending port order instead of a ascending order
- IP_SOURCE_RANDOMIZE = 'ip.src.shuffle' # randomizes the sources IP address if a list of IP addresses is given
- PORT_SOURCE_RANDOMIZE = 'port.src.shuffle' # randomizes the source port if a list of sources ports is given
- NAT_PRESENT = 'nat.present' # if NAT is active, external computers cannot initiate a communication in MembersMgmtCommAttack
- # recommended type: Filepath ------------------------------------
- FILE_CSV = 'file.csv' # filepath to CSV containing a communication pattern
- FILE_XML = 'file.xml' # filepath to XML containing a communication pattern
- # recommended type: CommType ------------------------------------
- COMM_TYPE = "comm.type" # the locality of bots in botnet communication (e.g. local, external, mixed)
- # recommended type: Percentage (0.0-1.0) ------------------------------------
- IP_REUSE_TOTAL = 'ip.reuse.total' # percentage of IPs in original PCAP to be reused
- IP_REUSE_LOCAL = 'ip.reuse.local' # percentage of private IPs in original PCAP to be reused
- IP_REUSE_EXTERNAL = 'ip.reuse.external' # percentage of public IPs in original PCAP to be reused
- # recommended type: Positive Integer between 0 and 100 ------------------------------------
- PACKET_PADDING = 'packet.padding'
- class ParameterTypes(Enum):
- """
- Defines types for parameters. These types may be used in the specification of allowed parameters within the
- individual attack classes. The type is used to verify the validity of the given value.
- """
- TYPE_IP_ADDRESS = 0
- TYPE_MAC_ADDRESS = 1
- TYPE_PORT = 2
- TYPE_INTEGER_POSITIVE = 3
- TYPE_TIMESTAMP = 4
- TYPE_BOOLEAN = 5
- TYPE_FLOAT = 6
- TYPE_PACKET_POSITION = 7 # used to derive timestamp from parameter INJECT_AFTER_PACKET
- TYPE_DOMAIN = 8
- TYPE_FILEPATH = 9
- TYPE_COMM_TYPE = 10
- TYPE_PERCENTAGE = 11
- TYPE_PADDING = 12
|