ddidd
This repository contains DDiDD software, which decides what filter to activate and deactivate depending on the perceived load on the server. (Please see the enclosed README for instructions.)
SYNOPSIS
ddidd -h/ -r FOLDER -s EPOCH -b NUM -l NUM -m SECS [-w FILE] [-H FILE] [-u FILE] [-F FILE] [-T PTS] [-e EXT] [-a ATFILE] [-q QUERY] [-n NLIM]
OPTIONS
-h
- Display help
-r
FOLDER
- Read input files in pcap.xz format from this folder
-s
EPOCH
- Start reading around 300 seconds before this attack start time
-b
NUM
- How many times above the avg number of requests we can allow.
-l
NUM
- In case that avg requests are zero, this is absolute number of requests we will allow
-m
SECS
- Run for this number of seconds (usually duration of the attack)
-w
FILE
- Optional training file for WR filter
-H
FILE
- Opional training file for HCF filter
-u
FILE
- Optional training file for UR filter
-f
FILE
- Optional training file for FQ filter
-T
PTS
- Optional deviance score threshold for WR filter
-e
EXT
- Optional file extension. In case folder has files for several POPs, only files with the given extension in the filename will be processed
-a
ATFILE
- Optional file listing IPs of resolvers participating in the attack
-q
QUERY
- Optional query (or list of queries, multiple -q options can be given) that are part of the attack. This is useful to establish ground truth when list of attack IPs is not available or is too long.
-n
NLIM
- Optional argument, how many windows to use for WR filter
Compilation
-
Compile for linux computer
Compile DDiDD with dynamically-linked library (see dependency for libraries)
Dependency
Reference
- A S M Rizvi, Jelena Mirkovic, John Heidemann and Wes Hardaker and Robert Story 2023. Defending Root DNS Servers Against DDoS Using Layered Defenses. Proceedings of the IEEE International Conference on Communications Systems and Networks (COMSNETS). Dataset for this paper is released via https://ant.isi.edu/datasets/all.html (DoS_DDiDD_Experiments-20230111 and B_Root_Anomaly-xxx).