CLI.py 7.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. #! /usr/bin/env python3
  2. import argparse
  3. import sys
  4. import random
  5. import numpy
  6. import hashlib
  7. from ID2TLib.Controller import Controller
  8. class LoadFromFile(argparse.Action):
  9. """
  10. Parses the parameter file given by application param -c/--config.
  11. """
  12. def __call__(self, parser, namespace, values, option_string=None):
  13. with values as f:
  14. parser.parse_args(f.read().split(), namespace)
  15. class CLI(object):
  16. def __init__(self):
  17. """
  18. Creates a new CLI object used to handle
  19. """
  20. # Reference to PcapFile object
  21. self.args = None
  22. self.attack_config = None
  23. def parse_arguments(self, args):
  24. """
  25. Defines the allowed application arguments and invokes the evaluation of the arguments.
  26. :param args: The application arguments
  27. """
  28. # Create parser for arguments
  29. parser = argparse.ArgumentParser(description="Intrusion Detection Dataset Toolkit (ID2T) - A toolkit for "
  30. "injecting synthetically created attacks into PCAP files.",
  31. prog="id2t")
  32. # Required arguments
  33. required_group = parser.add_argument_group('required arguments')
  34. required_args_group = required_group.add_mutually_exclusive_group(required=True)
  35. required_args_group.add_argument('-i', '--input', metavar="PCAP_FILE",
  36. help='path to the input pcap file')
  37. required_args_group.add_argument('-l', '--list-attacks', action='store_true')
  38. # Optional arguments
  39. parser.add_argument('-c', '--config', metavar='CONFIG_FILE', help='file containing configuration parameters.',
  40. action=LoadFromFile, type=open)
  41. parser.add_argument('-e', '--export',
  42. help='store statistics as a ".stat" file',
  43. action='store_true', default=False)
  44. parser.add_argument('-r', '--recalculate',
  45. help='recalculate statistics even if a cached version exists.',
  46. action='store_true', default=False)
  47. parser.add_argument('-s', '--statistics', help='print file statistics to stdout.', action='store_true',
  48. default=False)
  49. parser.add_argument('-p', '--plot', help='creates the following plots: the values distributions of TTL, MSS, Window Size, '
  50. 'protocol, and the novelty distributions of IP, port, TTL, MSS, Window Size,'
  51. ' and ToS. In addition to packets count in interval-wise.', action='append',
  52. nargs='?')
  53. parser.add_argument('-q', '--query', metavar="QUERY",
  54. action='append', nargs='?',
  55. help='query the statistics database. If no query is provided, the application enters query mode.')
  56. parser.add_argument('-t', '--extraTests', help='perform extra tests on the input pcap file, including calculating IP entropy'
  57. 'in interval-wise, TCP checksum, and checking payload availability.', action='store_true')
  58. parser.add_argument('--seed', help='random seed for the program, call the program with the same seed to get the same output')
  59. parser.add_argument('-o', '--output', metavar="PCAP_FILE",
  60. help='path to the output pcap file')
  61. # Attack arguments
  62. parser.add_argument('-a', '--attack', metavar="ATTACK", action='append',
  63. help='injects ATTACK into a PCAP file.', nargs='+')
  64. # Parse arguments
  65. self.args = parser.parse_args(args)
  66. self.process_arguments()
  67. def process_arguments(self):
  68. """
  69. Decide what to do with each of the command line parameters.
  70. """
  71. if self.args.seed is not None:
  72. self.seed_rng(self.args.seed)
  73. if self.args.list_attacks:
  74. # User wants to see the available attacks
  75. self.process_attack_listing()
  76. else:
  77. # User wants to process a PCAP
  78. self.process_pcap()
  79. def seed_rng(self, seed):
  80. try: # try to convert the seed to int
  81. seed = int(seed)
  82. except: # otherwise use the strings hash
  83. hashed_seed = hashlib.sha1(seed.encode()).digest()
  84. seed = int.from_bytes(hashed_seed, byteorder="little") & 0xffffffff # convert hash to 32-bit integer
  85. random.seed(seed)
  86. numpy.random.seed(seed)
  87. def process_attack_listing(self):
  88. import pkgutil
  89. import importlib
  90. import Attack
  91. # Find all attacks, exclude some classes
  92. package = Attack
  93. attack_names = []
  94. for _, name, __ in pkgutil.iter_modules(package.__path__):
  95. if name != 'BaseAttack' and name != 'AttackParameters':
  96. attack_names.append(name)
  97. # List the attacks and their parameters
  98. emph_start = '\033[1m'
  99. emph_end = '\033[0m'
  100. for attack_name in attack_names:
  101. attack_module = importlib.import_module('Attack.{}'.format(attack_name))
  102. attack_class = getattr(attack_module, attack_name)
  103. # Instantiate the attack to get to its definitions.
  104. attack_obj = attack_class()
  105. print('* {}{}{}'.format(emph_start, attack_obj.attack_name, emph_end))
  106. print('\t- {}Description:{} {}'.format(emph_start, emph_end,
  107. attack_obj.attack_description))
  108. print('\t- {}Type:{} {}'.format(emph_start, emph_end,
  109. attack_obj.attack_type))
  110. print('\t- {}Supported Parameters:{}'.format(emph_start, emph_end), end=' ')
  111. # Get all the parameter names in a list and sort them
  112. param_list = []
  113. for key in attack_obj.supported_params:
  114. param_list.append(key.value)
  115. param_list.sort()
  116. # Print each parameter type per line
  117. last_prefix = None
  118. current_prefix = None
  119. for param in param_list:
  120. current_prefix = param.split('.')[0]
  121. if not last_prefix or current_prefix != last_prefix:
  122. print('\n\t + |', end=' ')
  123. print(param, end=' | ')
  124. last_prefix = current_prefix
  125. # Print an empty line
  126. print()
  127. def process_pcap(self):
  128. """
  129. Loads the application controller, the PCAP file statistics and if present, processes the given attacks. Evaluates
  130. given queries.
  131. """
  132. # Create ID2T Controller
  133. controller = Controller(self.args.input, self.args.extraTests, self.args.output)
  134. # Load PCAP statistics
  135. controller.load_pcap_statistics(self.args.export, self.args.recalculate, self.args.statistics)
  136. # Create statistics plots
  137. if self.args.plot is not None:
  138. controller.create_statistics_plot(self.args.plot)
  139. # Process attack(s) with given attack params
  140. if self.args.attack is not None:
  141. # If attack is present, load attack with params
  142. controller.process_attacks(self.args.attack)
  143. # Parameter -q without arguments was given -> go into query loop
  144. if self.args.query == [None]:
  145. controller.enter_query_mode()
  146. # Parameter -q with arguments was given -> process query
  147. elif self.args.query is not None:
  148. controller.process_db_queries(self.args.query, True)
  149. def main(args):
  150. """
  151. Creates a new CLI object and invokes the arguments parsing.
  152. :param args: The provided arguments
  153. """
  154. cli = CLI()
  155. # Check arguments
  156. cli.parse_arguments(args)
  157. # Uncomment to enable calling by terminal
  158. if __name__ == '__main__':
  159. main(sys.argv[1:])