Skip to content

Best DDoS attack simulation environment with comprehensive attack vectors, AI service targeting, and fully customizable botnet topologies. Research, test, and visualize modern DDoS attacks in a controlled environment.

License

Notifications You must be signed in to change notification settings

ATinyShoe/DDoSKING

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

6 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ›ก๏ธ DDoSKING - DDoS Attack Automation Simulation Tool

DDoS Attack Simulation Environment for Network Security Research and Testing

License: GPL v3 Docker Memory Python Go

๐Ÿ“‹ Project Overview

DDoSKING is a Docker-based state-of-the-art DDoS attack automation simulation tool designed for research and testing of various DDoS attack techniques. The project consists of two core componentsโ€”DDoS attack plugins and network simulation componentsโ€”built on the Seed-emulator to create simulated network environments with a visualization interface. Attack plugins are developed in Go and deployed in Docker containers.

This comprehensive simulation environment covers current mainstream DDoS attack methods and botnet attacks, including attack simulations targeting AI services like DeepSeek. The entire simulation environment can replicate complete internet and DDoS attack scenarios on a single host, making it an all-in-one DDoS testing platform available to security researchers and professionals.

You can extract the attack plugins separately for testing in real environments, but please ensure you do so in a secure and legal environment.

โš ๏ธ Note: Deploying DeepSeek 1.5B requires at least 8GB of memory.

โœจ Why Choose DDoSKING?

DDoSKING stands out as the preferred DDoS simulation tool with the following key advantages:

  • ๐ŸŒŸ All-in-One Solution: Complete attack infrastructure simulation in a single environment
  • ๐Ÿ”„ Comprehensive Attack Coverage: Covers major DDoS attack types, including new pulse attacks like DNSBomb
  • ๐Ÿง  Trending Attack Simulations: Includes simulation scenarios of AI models like Deepseek under attack
  • ๐Ÿ–ผ๏ธ Visual Network Topology: Interactive visualization for better understanding of attack paths
  • ๐Ÿ”ฌ Research-Grade Testing: Suitable for academic research and security testing
  • ๐Ÿ› ๏ธ Highly Customizable: Easy to adjust parameters to adapt to custom attack scenarios
  • ๐ŸŒ Fully Customizable Network Topology: Build your own custom botnet infrastructure to match specific research scenarios

๐ŸŒ Network Customization Features

DDoSKING offers unparalleled flexibility in network design, enabling researchers to:

  • Create Custom Botnet Topologies: You can create larger-scale botnets and custom network topologies by modifying ddosking.py
  • Bot Host Control: Fine-tune parameters such as thread count, bandwidth, and other settings for bot hosts
  • Integrate Custom Attack Scripts: Add your own attack methods through Go implementation
  • Mixed Attack Types: Combine different attack vectors to create complex multi-vector attack scenarios, simulating trending attacks in real environments

The SeedEmu framework supporting DDoSKING enables you to simulate almost any network configuration, giving you complete freedom to build the exact botnet infrastructure needed for your research or testing.

๐Ÿ“Š Performance and Features

DDoSKING has been rigorously tested to provide:

  • Simulation of network environments with hundreds of nodes
  • Simultaneous support for multiple attack vectors
  • Real-time monitoring of attack effects
  • Highly realistic network behavior modeling
  • Containerized deployment for easy scaling and migration

๐Ÿ† Comparison with Other Solutions

Feature DDoSKING Traditional DDoS Tools Network Simulators
Complete DDoS Infrastructure โœ… โŒ โŒ
AI Service Attack Simulation โœ… โŒ โŒ
Pulse Attack Support โœ… โŒ โŒ
Visual Topology โœ… โŒ โœ…
Single-Host Deployment โœ… โœ… โŒ
Educational Value โœ… โš ๏ธ โœ…
Research Applications โœ… โš ๏ธ โœ…

๐Ÿ’ป System Requirements

To run the complete simulation environment, memory over 24GB is recommended.

๐Ÿงฉ System Components

We have built a sample environment for demonstration purposes. This environment simulates a complete DDoS attack infrastructure composed of the following independently built components:

Component Quantity Description
๐ŸŽฎ C2 Server 1 Responsible for sending attack commands to bot machines
๐Ÿ”„ Reflection Amplification Servers 5 Used for Layer 4 DDoS reflection amplification attacks
๐Ÿค– Bot Machines 2 Execute various attacks
๐Ÿ” Unbound DNS Resolver 1 Configured specifically for pulse attacks
๐ŸŒ DNS Authoritative Server 1 Used to accumulate and amplify pulse attack requests
๐Ÿง  DeepSeek 1.5B Server 1 Simulates HTTP attacks targeting AI services
๐ŸŽฏ Victim Server 1 Simulates the target server under attack

โ„น๏ธ Note: This simulation environment focuses on DDoS simulation and does not simulate botnet propagation or communication mechanisms (such as brute-forcing weak passwords, DGA searching for C2, etc.). These features may be added in future versions.

Other nodes are automatically generated by SeedEmu. For more details, please refer to the SeedEmu official documentation.

๐Ÿ’ฅ Attack Types

DDoSKING covers various types of DDoS attacks, mainly categorized as follows:

1. ๐ŸŒŠ Link Flood Attacks (Layer 4)

Attacks that fill network bandwidth with large volumes of traffic, including:

  • Direct Attacks: UDP Floods
  • Reflection Amplification Attacks: Amplification attacks using DNS, NTP, CLDAP, SSDP, and other protocols

2. ๐Ÿ”‹ Resource Exhaustion Attacks (Layer 7)

Attacks that exhaust server computing resources, including:

  • HTTP Floods: GET, POST-related methods, Slowloris, and other slow-rate attacks
  • Complex Prompt Attacks Against DeepSeek: Consuming AI service computational resources
  • SYN Floods: Depleting the target's half-open connection queue

3. โšก Pulse Attacks

Pulse attacks aim to send high-bandwidth packets in a short time, causing target queues to fill up, triggering timeouts and TCP congestion control, which degrades target TCP services. These attacks have relatively low total data volume but are highly destructive due to their concentrated burst nature:

๐Ÿš€ Environment Setup

It is recommended to deploy the environment on Linux. You can use tc to limit Docker network speeds for more precise traffic simulation.

๐Ÿ“ฆ Installation Steps

1. Docker Installation and Configuration

  • Install Docker: Refer to the official documentation
  • Note: Users in mainland China may need to configure Docker mirror sources, as the default DockerHub may have access restrictions.

2. Install Project Dependencies

# Run in the project root directory
pip3 install -r requirements.txt

๐Ÿƒ Start the Simulation Environment

# Run in the root directory
python3 ddosking.py

# Build and start Docker containers
cd output
docker-compose build && docker-compose up -d  # First-time build takes about half an hour

# Shut down the simulation environment
docker-compose down

To ensure normal operation of spoofed packet sending, you need to clear NAT rules built by Docker:

iptables -t nat -F

๐Ÿ’ก Tip: NAT rules can be restored by restarting Docker

Access the following URL in your browser to view the network topology map:

http://127.0.0.1:8080/map.html

โš™๏ธ Attack Configuration

C2 Server Setup

cd /root/c2
go run main.go  # Start the C2 server and begin listening

Bot Node Setup

# Automatic configuration, no manual operation required
cd /root/bot
go run .  # Start the service and connect to the C2 server

You can configure bot hosts in bot/attacker/attack/config.go, including packet rate limiting, thread count, and other parameters.

Reflector Node Setup

cd /root/reflector
go run main.go  # Start the service
# Enter 1 to begin listening

Unbound Server Setup

# Used for pulse attacks
service unbound start  # Start the service

DeepSeek Node Setup

# With tmux pre-installed, enter tmux first and then input command to start
tmux
OLLAMA_HOST=0.0.0.0 ollama serve

# After starting, press ctrl b+d to exit, then enter the following command in another terminal to start the terminal session
ollama run deepseek-r1:1.5b

Attack Parameter Adjustment

You can modify packet sending rates and other attack parameters in bot/attacker/attack/config.go.

๐Ÿ“ Notes

  1. Reflection Amplification Attack Traffic Limitations: After receiving packets, reflector amplifiers call functions to construct packets and then forward them. Due to CPU performance limitations, reflection amplification attack traffic is much smaller than direct UDP attacks (after the attack stops, reflectors will continue to process backlogged packets, extending the attack duration). You can adjust attack rates accordingly.
  2. Network Issue Handling: If you encounter network issues during use, try restarting Docker and clearing iptables rules.
  3. Safe Usage Principles: Please use this tool in a secure, controlled environment, solely for learning and research purposes.

๐Ÿ”ฎ Future Development

We are continuously improving DDoSKING, with plans to add:

  • More AI service attack simulation scenarios
  • Botnet propagation mechanism simulation
  • Extended attack vector library
  • Enhanced visualization and analysis capabilities
  • Integration with mainstream security tools
  • Performance optimization and resource usage reduction

๐Ÿ“œ License

This project is released under the GNU General Public License v3.0 (GNU GPL v3). For detailed terms, please refer to the LICENSE file in the project root directory.

โš ๏ธ Disclaimer

This project is intended solely for security research and educational purposes. Do not use it for any illegal activities. Users must bear full legal responsibility for any consequences arising from improper use.

About

Best DDoS attack simulation environment with comprehensive attack vectors, AI service targeting, and fully customizable botnet topologies. Research, test, and visualize modern DDoS attacks in a controlled environment.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published