omnetpp.ini 3.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. # ----------------------------------------------------------------------------
  2. #
  3. # HttpTools Project
  4. #
  5. # This file is a part of the HttpTools project. The project was created at
  6. # Reykjavik University, the Laboratory for Dependable Secure Systems (LDSS).
  7. # Its purpose is to create a set of OMNeT++ components to simulate browsing
  8. # behaviour in a high-fidelity manner along with a highly configurable
  9. # Web server component.
  10. #
  11. # Maintainer: Kristjan V. Jonsson (LDSS) kristjanvj@gmail.com
  12. # Project home page: code.google.com/p/omnet-httptools
  13. #
  14. # ----------------------------------------------------------------------------
  15. #
  16. # This program is free software; you can redistribute it and/or
  17. # modify it under the terms of the GNU General Public License version 3
  18. # as published by the Free Software Foundation.
  19. #
  20. # This program is distributed in the hope that it will be useful,
  21. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  22. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  23. # GNU General Public License for more details.
  24. #
  25. # You should have received a copy of the GNU General Public License
  26. # along with this program; if not, write to the Free Software
  27. # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  28. #
  29. # ----------------------------------------------------------------------------
  30. #
  31. # Initialization script for the simple DDoS example scenario. Scripted browsing is
  32. # used to create easily predictable and interpretable results. Sockets version.
  33. #
  34. [General]
  35. network = HttpNnodes
  36. tkenv-plugin-path = ../../../../etc/plugins
  37. # Controller
  38. **.controller.config = xmldoc("../../controller_cfg.xml","//controller-profile[@id='uniform']")
  39. **.controller.events = ""
  40. **.controller.eventsSection = ""
  41. # Common client/server parameters
  42. **.numTcpApps = 1
  43. **.tcpApp[0].httpProtocol = 11
  44. # Servers
  45. **.thegood.tcpApp[0].typename = "HttpServer"
  46. **.thegood.tcpApp[0].hostName = "www.good.com"
  47. **.thegood.tcpApp[0].port = 80
  48. **.thegood.tcpApp[0].logFile = ""
  49. **.thegood.tcpApp[0].siteDefinition = ""
  50. **.thegood.tcpApp[0].config = xmldoc("../../server_cfg.xml","//server-profile[@id='normal']")
  51. **.thegood.tcpApp[0].activationTime = 0.0
  52. # This server generates documents containing a number of references to images
  53. # stored on www.good.com. The unwitting browser will thus contribute to a DDoS attack
  54. # against the wictim site.
  55. **.thebad.tcpApp[0].typename = "HttpServerEvilA"
  56. **.thebad.tcpApp[0].hostName = "www.bad.org"
  57. **.thebad.tcpApp[0].port = 80
  58. **.thebad.tcpApp[0].logFile = ""
  59. **.thebad.tcpApp[0].siteDefinition = ""
  60. **.thebad.tcpApp[0].config = xmldoc("../../server_cfg.xml","//server-profile[@id='normal']")
  61. **.thebad.tcpApp[0].activationTime = 0.0
  62. **.thebad.tcpApp[0].minBadRequests = 3 # Very moderate attack
  63. **.thebad.tcpApp[0].maxBadRequests = 8
  64. # This server generates documents containing a number of references to non-existing resources
  65. # on www.good.com (random URLs). The unwitting browser will thus contribute to a DDoS attack
  66. # against the wictim site.
  67. **.theugly.tcpApp[0].typename = "HttpServerEvilB"
  68. **.theugly.tcpApp[0].hostName = "www.ugly.org"
  69. **.theugly.tcpApp[0].port = 80
  70. **.theugly.tcpApp[0].logFile = ""
  71. **.theugly.tcpApp[0].siteDefinition = ""
  72. **.theugly.tcpApp[0].config = xmldoc("../../server_cfg.xml","//server-profile[@id='normal']")
  73. **.theugly.tcpApp[0].activationTime = 0.0
  74. **.theugly.tcpApp[0].minBadRequests = 3 # Very moderate attack
  75. **.theugly.tcpApp[0].maxBadRequests = 8
  76. # Clients
  77. **.client[*].tcpApp[0].typename = "HttpBrowser"
  78. **.client[*].tcpApp[0].logFile = ""
  79. **.client[*].tcpApp[0].scriptFile = "browse.script" # Lets use a script to simplify the test
  80. **.client[*].tcpApp[0].config = xmldoc("../../browser_cfg.xml","//user-profile[@id='normal']")
  81. **.client[*].tcpApp[0].activationTime = 0.0
  82. # TCP settings
  83. **.tcp.mss = 1024
  84. **.tcp.advertisedWindow = 14336 # 14*mss
  85. **.tcp.tcpAlgorithmClass = "TCPReno"
  86. **.tcp.recordStats = true
  87. # ARP configuration
  88. **.networkLayer.proxyARP = true # Host's is hardwired "false"