-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.py
221 lines (198 loc) · 9.29 KB
/
main.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
from scapy.all import *
import time
from anomalia import AnomalIA
import warnings
warnings.filterwarnings("ignore")
# Variables globales para mantener el estado de las conexiones y el tiempo del último paquete
last_time = None
last_size = None
# Variables globales para mantener el estado de las conexiones
connection_states = {}
src_dport_counts = {}
dst_sport_counts = {}
dst_src_counts = {}
# Función para calcular la tasa de bits de destino
def calculate_dload(packet):
global last_time, last_size
current_time = time.time()
size = len(packet)
if last_time is None:
last_time = current_time
last_size = size
return 0.0
else:
# Calcular la tasa de bits de destino en bits por segundo
dload = abs((size - last_size) / (current_time - last_time))
last_time = current_time
last_size = size
return dload
# Función para actualizar los recuentos de conexiones
def update_connection_counts(packet, src_ip, dst_ip, src_port, dst_port, proto):
global connection_states, src_dport_counts, dst_sport_counts, dst_src_counts
# Actualizar los recuentos de conexiones según el protocolo
if proto == 6: # TCP
tcp_layer = packet.getlayer(TCP)
if tcp_layer:
flags = tcp_layer.sprintf('%TCP.flags%')
connection_states[(src_ip, dst_ip)] = flags
src_dport_counts[(src_ip, dst_port)] = src_dport_counts.get((src_ip, dst_port), 0) + 1
dst_sport_counts[(dst_ip, src_port)] = dst_sport_counts.get((dst_ip, src_port), 0) + 1
dst_src_counts[(src_ip, dst_ip)] = dst_src_counts.get((src_ip, dst_ip), 0) + 1
# Incrementar los contadores de tiempo de vida del estado de la conexión
ttl = packet[IP].ttl if IP in packet else 0
connection_states[(src_ip, dst_ip, "ct_state_ttl")] = ttl
connection_states[(src_ip, dst_ip, "ct_src_dport_ltm")] = tcp_layer.sport
connection_states[(src_ip, dst_ip, "ct_dst_sport_ltm")] = tcp_layer.dport
connection_states[(src_ip, dst_ip, "ct_dst_src_ltm")] = dst_src_counts[(src_ip, dst_ip)]
elif proto == 17: # UDP
connection_states[(src_ip, dst_ip)] = 0 # Estado 0 para UDP
src_dport_counts[(src_ip, dst_port)] = src_dport_counts.get((src_ip, dst_port), 0) + 1
dst_sport_counts[(dst_ip, src_port)] = dst_sport_counts.get((dst_ip, src_port), 0) + 1
dst_src_counts[(src_ip, dst_ip)] = dst_src_counts.get((src_ip, dst_ip), 0) + 1
elif proto == 1: # ICMP
connection_states[(src_ip, dst_ip)] = 0 # Estado 0 para ICMP
src_dport_counts[(src_ip, dst_port)] = src_dport_counts.get((src_ip, dst_port), 0) + 1
dst_sport_counts[(dst_ip, src_port)] = dst_sport_counts.get((dst_ip, src_port), 0) + 1
dst_src_counts[(src_ip, dst_ip)] = dst_src_counts.get((src_ip, dst_ip), 0) + 1
# Función de callback para procesar cada paquete capturado
def process_packet(packet):
global last_time, last_size
printed_something = False # Variable auxiliar para verificar si algo se ha impreso
if IP in packet:
proto = packet[IP].proto
src_ip = packet[IP].src
dst_ip = packet[IP].dst
# Asignar valor 1 si el protocolo es TCP, 2 si es UDP, 3 si es ICMP, 0 si no lo es
if proto == 6: # TCP
protocol_label = "1"
state = packet[TCP].sprintf('%TCP.flags%')
state_INT = 1 if state == "INT" else 0
state_CON = 1 if state == "CON" else 0
state_FIN = 1 if state == "FIN" else 0
sttl = packet[IP].ttl if IP in packet else 0
swin = packet[TCP].window
dwin = packet[TCP].options[3][1] if packet[TCP].options and len(packet[TCP].options) > 3 else 0 # Extraer dwin si existe
elif proto == 17: # UDP
protocol_label = "2"
sttl = packet[IP].ttl if IP in packet else 0
swin = 0 # No hay campo de ventana en UDP
dwin = 0
state = None
state_INT = None
state_CON = None
state_FIN = None
elif proto == 1: # ICMP
protocol_label = "3"
sttl = packet[IP].ttl if IP in packet else 0
swin = 0 # No hay campo de ventana en ICMP
dwin = 0
state = None
state_INT = None
state_CON = None
state_FIN = None
else:
protocol_label = "0"
state_code = 0
state_INT = 0
state_CON = 0
state_FIN = 0
sttl = packet[IP].ttl if IP in packet else 0
swin = 0
dwin = 0
state = None
state_INT = None
state_CON = None
state_FIN = None
if proto == 6:#TCP
src_port = packet[TCP].sport
dst_port = packet[TCP].dport
# Calcular la tasa de bits de destino
dload = calculate_dload(packet)
# Actualizar los recuentos de conexiones
update_connection_counts(packet, src_ip, dst_ip, src_port, dst_port, proto)
# Imprimir los detalles del paquete si algo se imprime
data = {
"sttl": sttl,
"state_INT": state_INT,
"ct_state_ttl": 0,
"proto_tcp": 1 if proto == 6 else 0,
"swin": swin,
"dload": dload,
"state_CON": state_CON,
"dwin": dwin,
"state_FIN": state_FIN
}
# print(data)
if ia.predict_anomaly(data) == 1:
printed_something = True
print("ATAQUE!")
print("Tipo de anomalía:", ia.predict_attack(data))
print(f"PROTO: {protocol_label}, IPSRC: {src_ip} : SPORT: {src_port}, IPDST: {dst_ip} : DPORT: {dst_port}, STATE: {state}, STTL: {sttl}, DLOAD: {dload}, SWIN: {swin}, DWIN: {dwin}, STATE_INT: {state_INT}, STATE_CON: {state_CON}, STATE_FIN: {state_FIN}")
print("Tráfico anómalo")
#print(f"PROTO: {protocol_label}, IPSRC: {src_ip} : SPORT: {src_port}, IPDST: {dst_ip} : DPORT: {dst_port}, STATE: {state}, STTL: {sttl}, DLOAD: {dload}, SWIN: {swin}, DWIN: {dwin}, STATE_INT: {state_INT}, STATE_CON: {state_CON}, CT_STATE_TTL: {connection_states.get((src_ip, dst_ip, 'ct_state_ttl'), STATE_FIN: {state_FIN}")
#print()
#print()
elif proto == 17:#UDP
src_port = packet[UDP].sport
dst_port = packet[UDP].dport
# Calcular la tasa de bits de destino
dload = calculate_dload(packet)
# Actualizar los recuentos de conexiones
update_connection_counts(packet, src_ip, dst_ip, src_port, dst_port, proto)
# Imprimir los detalles del paquete si algo se imprime
data = {
"sttl": sttl,
"state_INT": state_INT,
"ct_state_ttl": 0,
"proto_tcp": 1 if proto == 6 else 0,
"swin": swin,
"dload": dload,
"state_CON": state_CON,
"dwin": dwin,
"state_FIN": state_FIN
}
# print(data)
if ia.predict_anomaly(data) == 1:
printed_something = True
print("ATAQUE!")
print("Tipo de anomalía:", ia.predict_attack(data))
print("Tráfico anómalo")
print(f"PROTO: {protocol_label}, IPSRC: {src_ip} : SPORT: {src_port}, IPDST: {dst_ip} : DPORT: {dst_port}, STATE: {state}, STTL: {sttl}, DLOAD: {dload}, SWIN: {swin}, DWIN: {dwin}, STATE_INT: {state_INT}, STATE_CON: {state_CON}, STATE_FIN: {state_FIN}")
#print()
#print()
elif proto == 1:#ICMP
src_port = packet[ICMP].sport
dst_port = packet[ICMP].dport
# Calcular la tasa de bits de destino
dload = calculate_dload(packet)
# Actualizar los recuentos de conexiones
update_connection_counts(packet, src_ip, dst_ip, src_port, dst_port, proto)
# Imprimir los detalles del paquete si algo se imprime
data = {
"sttl": sttl,
"state_INT": state_INT,
"ct_state_ttl": 0,
"proto_tcp": 1 if proto == 6 else 0,
"swin": swin,
"dload": dload,
"state_CON": state_CON,
"dwin": dwin,
"state_FIN": state_FIN
}
# print(data)
if ia.predict_anomaly(data) == 1:
printed_something = True
print("ATAQUE!")
print("Tipo de anomalía:", ia.predict_attack(data))
print(f"PROTO: {protocol_label}, IPSRC: {src_ip} : SPORT: {src_port}, IPDST: {dst_ip} : DPORT: {dst_port}, STATE: {state}, STTL: {sttl}, DLOAD: {dload}, SWIN: {swin}, DWIN: {dwin}, STATE_INT: {state_INT}, STATE_CON: {state_CON}, STATE_FIN: {state_FIN}")
#print()
#print()
# Si nada se ha impreso, imprimir "FALSE"
if not printed_something:
print("Normal...")
# Iniciar la captura de paquetes
ia = AnomalIA(
"models/Anomalies_Detector/anomalies_rf.pkl",
"models/Anomalies_Detector/attacks_rf.pkl"
)
sniff(prn=process_packet, store=0)