Simulation Tool

Protocol

Attack

Description

Trinoo

UDP

UDP flood

・ Greatly used by research community

・ Bandwidth depletion tool that launches coordinated UDP floods against IP addresses

・ Does not spoof source address

Ddosflowgen [16]

UDP, TCP

UDP flood, TCP requests,

Mirai scans

・ Can handle attacks beyond 1Tbps(terabits per second)

・ Generates synthetic traffic datasets from N views

・ Ability to define number of attacking networks and adjust parameters like amplification factor, attack vectors, number of network attack sources

・ Human-readable topology

OMNET++ [17]

UDP, TCP, ICMP

Transport layer attack

・ Capable of TCP/IP simulation

・ Manageable form a web server

・ Cannot generate traffic

Tribe Flood Network (TFN)

TCP protocol and UDP and ICMP protocols

TCP SYN and , ICMP flood, smurf

・ Used to deplete bandwidth and resources

・ employs command line interface for attacker and control master communication

・ Unencrypted

TFN2K

TCP,UDP,ICMP

ICMP flood, SYN flood, UDP flood, smurf,

・ Advanced version of TFN DDoS attack tool

・ Encrypts message among attack components

・ Uses CAST-256 algorithm to encrypt communication between attacker and control master program

・ Forges packets to appear to originate from close systems

・ Converts covert exercises to hide from intrusion detection systems

Stacheldraht

ICMP protocol and UDP and TCP

TCP SYN flood, UDP flood, ICMP echo request flood

・ Combines features of TFN and Trinoo to eliminate weaknesses of TFN

・ Automatic agent updates

・ Encrypted telnet communication between handlers and attackers

・ Communicates via ICMP and TCP packets

Rnstream

TCP,UDP

TCP ACK flood

・ Simple point-to-point TCP ACK flood tool that overpowers the fast routing routine table in switches

・ Unencrypted communication via TCP/UPD packets

・ Master connects to zombie via telnet

・ ACK packets hit target then and sends TCP RST to spoofed IP addresses

・ Routers responds with ICMP unreachable leading to bandwidth starvation

・ Creates random source IP address bits as a spoof approach

Shaft

ICMP, UDP, and TCP

TCP flood, UDP flood, ICMP flood

・ It is the successor of Trinoo

・ Handlers and agents communicate via UDP

・ It randomizes source port and IP addresses in packets

・ Fixed packet size during attack

・ Switches control master servers and ports in real time thereby making it difficult for intrusion detection tools

LOIC

TCP, UDP, HTTP

UDP, TCP, HTTP flood

・ IRC based anonymous attacking tool

・ Exists as either binary or web-based versions