AttackParameters.py 4.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. import enum
  2. class Parameter(enum.Enum):
  3. """
  4. Defines the shortname for attack parameters. The shortname may be used for attack parameter specification
  5. when calling Core via the command line.
  6. """
  7. # recommended type: IP address -------------------------------
  8. IP_SOURCE = 'ip.src' # source IP address
  9. IP_DESTINATION = 'ip.dst' # destination IP address
  10. IP_DNS = 'ip.dns' # IP address of DNS server
  11. HOSTING_IP = 'hosting.ip'
  12. IP_DESTINATION_END = 'ip.dst.end'
  13. # recommended type: MAC address ------------------------------
  14. MAC_SOURCE = 'mac.src' # MAC address of source
  15. MAC_DESTINATION = 'mac.dst' # MAC address of destination
  16. # recommended type: Port -------------------------------------
  17. PORT_OPEN = 'port.open' # open ports
  18. PORT_DESTINATION = 'port.dst' # destination ports
  19. PORT_SOURCE = 'port.src' # source ports
  20. # recommended type: Integer positive -------------------------
  21. PACKETS_LIMIT = 'packets.limit'
  22. NUMBER_ATTACKERS = 'attackers.count'
  23. ATTACK_DURATION = 'attack.duration' # in seconds
  24. VICTIM_BUFFER = 'victim.buffer' # in packets
  25. TARGET_URI = 'target.uri'
  26. # recommended type: domain -----------------------------------
  27. TARGET_HOST = 'target.host'
  28. # recommended type: Float ------------------------------------
  29. PACKETS_PER_SECOND = 'packets.per-second' # packets per second
  30. INJECT_AT_TIMESTAMP = 'inject.at-timestamp' # unix epoch time (seconds.millis) where attack should be injected
  31. # recommended type: Packet Position ----------------------------------
  32. INJECT_AFTER_PACKET = 'inject.after-pkt' # packet after which attack should be injected
  33. # recommended type: boolean --------------------------------
  34. PORT_DEST_SHUFFLE = 'port.dst.shuffle' # shuffles the destination ports if a list of ports is given
  35. PORT_DEST_ORDER_DESC = 'port.dst.order-desc' # uses a descending port order instead of a ascending order
  36. IP_SOURCE_RANDOMIZE = 'ip.src.shuffle' # randomizes the sources IP address if a list of IP addresses is given
  37. PORT_SOURCE_RANDOMIZE = 'port.src.shuffle' # randomizes the source port if a list of sources ports is given
  38. PROTOCOL_VERSION = 'protocol.version'
  39. HOSTING_VERSION = 'hosting.version'
  40. SOURCE_PLATFORM = 'src.platform'
  41. CUSTOM_PAYLOAD = 'custom.payload' # custom payload for ftp exploits
  42. CUSTOM_PAYLOAD_FILE = 'custom.payload.file' # file that contains custom payload for ftp exploits
  43. NAT_PRESENT = 'nat.present' # if NAT is active, external computers cannot initiate a communication in MembersMgmtCommAttack
  44. TTL_FROM_CAIDA = 'ttl.from.caida' # if True, TTLs are assigned based on the TTL distributions from the CAIDA dataset
  45. NUMBER_INITIATOR_BOTS = 'bots.count'
  46. # recommended type: Filepath ------------------------------------
  47. FILE_CSV = 'file.csv' # filepath to CSV containing a communication pattern
  48. FILE_XML = 'file.xml' # filepath to XML containing a communication pattern
  49. # recommended type: CommType ------------------------------------
  50. COMM_TYPE = "comm.type" # the locality of bots in botnet communication (e.g. local, external, mixed)
  51. # recommended type: Percentage (0.0-1.0) ------------------------------------
  52. IP_REUSE_TOTAL = 'ip.reuse.total' # percentage of IPs in original PCAP to be reused
  53. IP_REUSE_LOCAL = 'ip.reuse.local' # percentage of private IPs in original PCAP to be reused
  54. IP_REUSE_EXTERNAL = 'ip.reuse.external' # percentage of public IPs in original PCAP to be reused
  55. # recommended type: Positive Integer between 0 and 100 ------------------------------------
  56. PACKET_PADDING = 'packet.padding'
  57. # calculate the destination port based on the hostname (like some botnets do)
  58. # otherwise the destination port is a normal ephemeral port
  59. BOTNET_DST_PORT_CALCULATION = "botnet.dstportcalculation"
  60. class ParameterTypes(enum.Enum):
  61. """
  62. Defines types for parameters. These types may be used in the specification of allowed parameters within the
  63. individual attack classes. The type is used to verify the validity of the given value.
  64. """
  65. TYPE_IP_ADDRESS = 0
  66. TYPE_MAC_ADDRESS = 1
  67. TYPE_PORT = 2
  68. TYPE_INTEGER_POSITIVE = 3
  69. TYPE_TIMESTAMP = 4
  70. TYPE_BOOLEAN = 5
  71. TYPE_FLOAT = 6
  72. TYPE_PACKET_POSITION = 7 # used to derive timestamp from parameter INJECT_AFTER_PACKET
  73. TYPE_DOMAIN = 8
  74. TYPE_STRING = 9
  75. TYPE_FILEPATH = 10
  76. TYPE_COMM_TYPE = 11
  77. TYPE_PERCENTAGE = 12
  78. TYPE_PADDING = 13