Skip to content

williamQ96/LLM-DDOS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LLM-DDOS: AI-Orchestrated Distributed Denial-of-Service Simulation

A research-focused simulation system that uses Large Language Models (LLMs) to autonomously orchestrate and simulate DDoS attacks. This project demonstrates how AI agents can coordinate observation, analysis, and attacks in a distributed architecture.

🧠 Project Structure

  • Commander Node: Observes the target, analyzes network status using an LLM (Mistral), and issues strategy commands via Redis pub/sub.
  • Ninja Nodes: Subscribe to the commander’s channel, receive attack instructions, and execute simulated DDoS attacks (e.g., SYN flood, HTTP flood, Slowloris) using external tools or internal scripts.
  • Target: A mock or live endpoint being monitored and attacked for research and testing purposes.

πŸ“‚ Directory Structure

C:.
β”‚   docker-compose.yml
β”‚   ninja_1.log
β”‚   output.txt
β”‚   README.md
β”‚   Slides.pdf
β”‚   ui_console.log
β”‚
β”œβ”€β”€ attack
β”‚   β”œβ”€β”€ http_flood.py
β”‚   β”œβ”€β”€ slowloris.py
β”‚   β”œβ”€β”€ tcp_flood.py
β”‚   └── __pycache__
β”‚       β”œβ”€β”€ http_flood.cpython-312.pyc
β”‚       β”œβ”€β”€ slowloris.cpython-312.pyc
β”‚       └── tcp_flood.cpython-312.pyc
β”‚
β”œβ”€β”€ images
β”‚   └── ollama_output.png
β”‚
β”œβ”€β”€ infra
β”‚   β”œβ”€β”€ monitor.py
β”‚   β”œβ”€β”€ pubsub.py
β”‚   └── __pycache__
β”‚       β”œβ”€β”€ monitor.cpython-312.pyc
β”‚       └── pubsub.cpython-312.pyc
β”‚
β”œβ”€β”€ llm
β”‚   β”œβ”€β”€ prompt_templates.py
β”‚   β”œβ”€β”€ finetune_config
β”‚   └── __pycache__
β”‚       └── prompt_templates.cpython-312.pyc
β”‚
β”œβ”€β”€ log
β”‚   β”œβ”€β”€ commander_1.log
β”‚   β”œβ”€β”€ console.log
β”‚   └── ninja_1a.log
β”‚
β”œβ”€β”€ nodes
β”‚   β”œβ”€β”€ commander.py
β”‚   β”œβ”€β”€ commander_ai.py
β”‚   └── ninja.py
β”‚
β”œβ”€β”€ scripts
β”‚   └── fake_traffic.py
β”‚
└── ui
    β”œβ”€β”€ control_panel.py
    └── print_log.py

πŸš€ Getting Started

Prerequisites

  • Python 3.8+
  • Docker (for Redis)
  • Ollama with Mistral model loaded(or any LLM model depends on your capacity and configurtion)

Installation

Clone the repo

git clone https://github.com/williamq96/LLM-DDOS.git cd LLM-DDOS

Create virtual environment

python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate

Install Python dependencies

pip install -r requirements.txt

Start Redis using Docker

docker compose up -d

πŸš€ Running the Simulation

Start the Commander AI

python nodes/commander_ai.py --name commander-1 --channel commander-1-channel

Start a Ninja Node

python nodes/ninja_node.py --name ninja-1 --channel commander-1-channel

You can run multiple Ninja nodes concurrently to simulate a distributed botnet.

βš™οΈ Configuration

Change channel names and loop intervals in the scripts as needed.

Modify llm/prompt_templates.py to adjust system prompts for the Commander.

πŸ“ˆ Research Goals

Showcase autonomous agent behavior in coordinated attacks.

Compare performance between different LLMs for tactical decisions.

Explore mitigation strategies and defense against adaptive AI-based attacks.

⚠️ Disclaimer

This project is intended for educational and research purposes only. Do not use it to perform unauthorized attacks on real systems. Always test in controlled environments.

πŸ“„ License

MIT License

About

LLM-DDOS is a simulated AI-driven distributed denial-of-service (DDoS) orchestration framework. It leverages large language models (LLMs) as autonomous command agents to monitor targets, generate attack strategies, and coordinate distributed nodes in real time using Pub/Sub messaging. Designed for academic and experimental use.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages