Content-type: text/html Manpage of stak

stak

Section: User Commands (1)
Updated: 21-March-2004
Index Return to Main Contents
 

NAME

stak - Statistical Traffic Analysis Kit  

SYNOPSIS

stakrate [generic options] [rate-estimator-specific options]

stakhosts [generic options] [host-statistics-specific options]

stakasta [generic options] [as-traffic-analyzer-specific options]

stakextract [generic options] [regex-extractor-specific options]

stakstreams [generic options] [stream-analyzer-specific options]
 

DESCRIPTION

stak helps an administrator to figure out what is happening in his network at the moment. Unlike tcpdump(1), stak uses statistical and stream-oriented traffic analysing methods, and it will never produce an output stream at a speed beyond human perception. The output is less accurate, however.

stak consists of five different utilities, designed to perform the following tasks:

estimating overall traffic rates (stakrate)

determining nodes generating the highest traffic (stakhosts)

determining connections and flows generating the highest traffic (stakstreams)

extracting strings from packets (stakextract)

estimating traffic exchange with particular autonomous systems (stakasta)

All the utilities share a generic sniffer framework, based on the pcap(3) library.

 

USAGE

Each of the utilities accepts parameters in a standard, short getopt(3) syntax. There are several options concerning the sniffer framework, common for the all stak utilities - these options are described below in this manual.

After a successful startup, each of the utilities installs a packet capturing handler and starts to process data and generate reports. The default report generating policy is to dump a report to stdout every 100 milliseconds - you can adjust this time using the -r option, or choose a different report generation policy (on key stroke, or upon receiving a signal) by using the -g or -k options.

Each utility processes the captured data and presents the results in its very own way and thus has its very own set of specific options. You can find these on separate manual pages.

Always make sure stak has enough information on datalink layer protocol present on the interface it was ordered to bind to. Consult the -p option description for details.

 

GENERIC OPTIONS

-0 c
Replace every NUL character (ASCII 0) with c before doing regular expression based matching. Ignored if the -x option was not specified. The default is '@'.
-c
Color (ANSI-compatible) output in modes that support it (currently: stream analyzer and "abusers detection" mode).
-f f
BPF filter expression to use. Using this option causes stak to ignore any packets not matching the specified BPF filter expression. For a detailed description of BPF filter expressions syntax, consult the tcpdump(1) manual page.
-g
Signal-based report generation policy. The reports are dumped whenever stak receives a SIGUSR1 signal.
-h -?
Print help. stak dumps a short help on available command-line options and quits, regardless of other options.
-i I
Bind to interface I. The default is 'eth0', which of course will cause a failure on systems other than Linux. Make sure you specify the datalink prefix (see -p) when you order stak to bind to an interface of an uncommon type.
-k
Interactive report generation. The reports are dumped whenever data is available on the standard input, which usually means you'll have to press RETURN in order to generate a report.
-l
Make stdout line-buffered. This option is useful when reports are redirected (eg. using shell redirection) to a file.
-n
Turns off asynchronous reverse DNS lookups. stak will print numeric IPs rather than fully qualified domain names.
-p N
Datalink layer header prefix length. Every (or at least almost every) known datalink layer protocol prefixes a packet with its own header - which has to be stripped before the actual data essential for stak (the IP protocol header) can be read. stak is able to determine automatically how many bytes to skip only for the most common datalink layer protocols (Ethernet, FDDI, TokenRing, loopback, PPP) - in other cases the prefix length must be specified using this option. It is EXTREMELY IMPORTANT to set the right value - otherwise stak might print completely irrevelant reports and output invalid IP addresses. The default is autosense, or if that fails - 14 bytes, which is the length of an Ethernet header.
-q N
Orders stak to quit after outputting N reports.
-r N
Time-based report generation policy. The reports will be dumped on stdout every N seconds. This is the default (with N = 0.1).
-s N
Capture at least N bytes. For performance reasons, stak does not acquire the whole packet from network, it just reads and processes first N bytes. The default is 64 bytes, which might be not enough if you are using complicated BPF expressions or filtering the packets using a regular expression. In such cases, it is good to set the capture length to MTU on the interface. The value is automatically increased to at least 1500 (which is the default MTU for an Ethernet interface) if one of -x, -E or -T options is used. This option does NOT affect statistical data (amount of bytes, per-second byte rate) collected by stak - the accounted packet size is always the 'real' one.

-v
Print exact values. Normally, stak uses SI prefixes (like k - kilo, M - mega, G - giga, T - tera) to make the printed numeric values more attractive for a human being. The -v option disables this feature, causing stak to print exact values.
-x
Clear the screen before printing each report. This assumes your terminal is capable of understanding certain control sequences.
-X r
Regular expression-based filtering. This option will cause stak to ignore packets that DO NOT match specified regular expression. Before any tests, NUL characters occuring in a packet are replaced with an other character, as specified in the -0 option (the default is '@'). Consult regex(5) manual for a detailed description of POSIX regular expressions. In addition to standard regex syntax, you may use the \r (CR), \n (LF), \t (TAB), \\ (\) and \xNN (hex NN) special sequences.

 

BUGS AND LIMITATIONS

The TRAFFIC ANALYZER (-T) operation mode is experimental. It consumes large amounts of system resources. Memory leaks in code that provides this feature are possible.

 

SEE ALSO

stakrate(1), stakhosts(1), stakasta(1), stakstreams(1), stakextract(1), tcpdump(1), regex(7), pcap(3), bpf(4)

 

AUTHOR

Mateusz Golicz <ziewk@jaszczur.org>

Feel free to send comments, suggestions, bug reports, etc. The author is not a native english speaker, and is aware of the fact that his english is far from perfect. Because of that, reports on grammar or vocabulary mistakes in this manual are also welcome.

The asynchronous DNS resolver part was taken from mtr - a very handy traceroute replacement by Matt Kimball.

 

LICENSE

Copyright 2003 - 2004 Mateusz Golicz. All rights reserved.

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, Version 2, as published by the Free Software Foundation. A copy of this license is distributed with this software in the file "COPYING".

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Read the file "COPYING" for more details.


 

Index

NAME
SYNOPSIS
DESCRIPTION
USAGE
GENERIC OPTIONS
BUGS AND LIMITATIONS
SEE ALSO
AUTHOR
LICENSE

This document was created by man2html, using the manual pages.
Time: 14:58:33 GMT, March 21, 2004