Skip to main content

This website only uses technically necessary cookies. They will be deleted at the latest when you close your browser. To learn more, please read our Privacy Policy.

DE EN
Login
Logo, to home
  1. You are here:
  2. Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
...

    Dataset: Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues

    • RADAR Metadata
    • Content
    • Statistics
    • Technical Metadata
    Alternate identifier:
    (KITopen-DOI) 10.5445/IR/1000141655
    Related identifier:
    -
    Creator/Author:
    Walter, Maximilian https://orcid.org/0000-0003-0358-6644 [Walter, Maximilian]

    Heinrich, Robert [Heinrich, Robert]

    Reussner, Ralf [Reussner, Ralf]
    Contributors:
    -
    Title:
    Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues
    Additional titles:
    -
    Description:
    (Technical Remarks) # Dataset for Attacker Propagation ## Content There are 4 folders: * **binary** for an excutable version * **effort_reduction** data-sheet for the effort calculation * **evaluationmodel** PCM models of the 3 case studies and expected results * **source** source for the analysis and the metamodel ## ... # Dataset for Attacker Propagation ## Content There are 4 folders: * **binary** for an excutable version * **effort_reduction** data-sheet for the effort calculation * **evaluationmodel** PCM models of the 3 case studies and expected results * **source** source for the analysis and the metamodel ## Executing with the binary We bundled a eclipse product, which can be used to start our analysis and view the models. It should be configured that it automatically opens a workspace with the necessary projects loaded. In case that won't happen, the projects can be manually loaded over the source folder and there *Palladio-Addons-ContextConfidentiality-Analysis/tests/org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels/* or for the automatic test *Palladio-Addons-ContextConfidentiality-Analysis/tests/edu.kit.ipd.sdq.kamp4attack.tests/* Here we describe the step to execute the binary: * Unzip the version of your Operating System * **Attention:** The MAC-Version might not work, because of MACOS security features. In that case [this](https://sdqweb.ipd.kit.edu/wiki/PCM_Installation#Mac_OS_X) might help. If not, you can still use the update site or manually install the tooling, but you are required to solve the dependencies manually. * We also provide an vm image for the tooling in the binary folder and there the vm folder * In the VM the Procuct is in the home directory under AttackerPropagation * The credentials for the vm are: * User: icsa * Password: icsa * Root-Password: icsa * Start the Application by executing the *PalladioBench* binary (not the eclipse one!) * After the load screen you should see 3 Projects in the Modelviewer on the left side: * edu.kit.ipd.sdq.kamp4attack.tests * org.palladiosimulator.pcm.confidentiality.context.analysis.testframework * org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels * The models are stored in *org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels*. * By clicking on the arrow before the project you can see the content. * The evaluation models are stored in the following folders: * models/powerGrid * models/targetBreach * models/travelplanner * Each folder contains the pcm models (allocation, reposity, resourceenvironment, system, usagemodel), the attackermodel (*.attacker), the access control model (*.context), the result model (*.kamp4attackmodificationmarks) and eclipse launchconfig (*.launch) * with the launch config the scenario can be executed, by opening the context menu (normally right clock) and clicking "Run as" * for a description of the models see Model Description * Additionally the accuracy tests can be executed automatically as Junit-Plugin-Test (only in the Linux binary): * Open edu.kit.ipd.sdq.kamp4attack.tests project * Navigate in the src folder to *edu.kit.ipd.sdq.kamp4attack.tests.casestudies* and *edu.kit.ipd.sdq.kamp4attack.tests.casestudies.travelplanner*. * By opening the context menu (right click usually) and "Run as" Junit-**Plugin**-Test * It is important to execute the tests as Plugin Tests since otherwise the dependencies can't be solved * For Windows and Mac-User they can run the test by executing `mvn clean verify` in *source/Palladio-Addons-ContextConfidentiality-Analysis/* or use the vm image in case maven does not work ## Executing without the binaries * Build each source project with maven * Projects generates an updatesite usually in the releng folder in an folder ending with .updatesite * These updatesites need to be installed in an eclipse installation. An README can be find in the source analysis source folder for the necessary dependencies ## Model Descripton * Target Breach * in folder targetBreach * Ukrainian Power Grid * in folder powerGrid * TravelPlanner * in folder travelplanner * Scenarios in folder *Attacker_Propagation_Accuracy*: 1. An Empty Attacker model. The analysis has no attacker, therefore no propagation should happen 2. The attacker has no attack therefore only the initial component is affected 3. The attacker has no specific attack but has some stolen credential. Therefore, only the credentials are allowed for the propagation 4. Propagations based on vulnerabilites. The attacker has attacks for mainly one attack step. To verify that each propagation types work 1. A Component to a Seff Propagation 2. A Component to Component Propagtion 3. The component compromises the resource it is deployed on 4. The component compromises a remote resource (not the one it is deployed on) 5. A linking Resource compromises a connected Resource container 6. A linking Resource compromises a connected component 7. A resource compromises a connected component 8. A resource compromises another connected resource 5. The attacker gains a new credential based on an attack, but can't take full control of the Linking Resource 6. Tests whether the AttackVector option is considered in the analysis 7. Tests whether the Privilege option is considered in the analysis ## Resultsmodel The ids of the non pcm elements (ServiceRestrictions and CompromisedData) might change for every run, since they are dynamically calculated for each analysis step. However, this is not problematic since they can identified by their other properties. ## Further Information Additional information and the current source code can be found at our Github repositories: * [Metamodel]https://github.com/FluidTrust/Palladio-Addons-ContextConfidentiality-Metamodel) * [Analysis](https://github.com/FluidTrust/Palladio-Addons-ContextConfidentiality-Analysis) * [Bench-Product](https://github.com/FluidTrust/Palladio-Bench-Product-AttackerPropagation)

    Dataset for Attacker Propagation

    Content

    There are 4 folders:

    • binary for an excutable version
    • effort_reduction data-sheet for the effort calculation
    • evaluationmodel PCM models of the 3 case studies and expected results
    • source source for the analysis and the metamodel

    Executing with the binary

    We bundled a eclipse product, which can be used to start our analysis and view the models. It should be configured that it automatically opens a workspace with the necessary projects loaded. In case that won't happen, the projects can be manually loaded over the source folder and there Palladio-Addons-ContextConfidentiality-Analysis/tests/org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels/ or for the automatic test Palladio-Addons-ContextConfidentiality-Analysis/tests/edu.kit.ipd.sdq.kamp4attack.tests/ Here we describe the step to execute the binary:

    • Unzip the version of your Operating System
      • Attention: The MAC-Version might not work, because of MACOS security features. In that case this might help. If not, you can still use the update site or manually install the tooling, but you are required to solve the dependencies manually.
      • We also provide an vm image for the tooling in the binary folder and there the vm folder
      • In the VM the Procuct is in the home directory under AttackerPropagation
      • The credentials for the vm are:
        • User: icsa
        • Password: icsa
        • Root-Password: icsa
    • Start the Application by executing the PalladioBench binary (not the eclipse one!)
    • After the load screen you should see 3 Projects in the Modelviewer on the left side:
      • edu.kit.ipd.sdq.kamp4attack.tests
      • org.palladiosimulator.pcm.confidentiality.context.analysis.testframework
      • org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels
    • The models are stored in org.palladiosimulator.pcm.confidentiality.context.analysis.testmodels.
      • By clicking on the arrow before the project you can see the content.
      • The evaluation models are stored in the following folders:
        • models/powerGrid
        • models/targetBreach
        • models/travelplanner
      • Each folder contains the pcm models (allocation, reposity, resourceenvironment, system, usagemodel), the attackermodel (.attacker), the access control model (.context), the result model (.kamp4attackmodificationmarks) and eclipse launchconfig (.launch)
        • with the launch config the scenario can be executed, by opening the context menu (normally right clock) and clicking "Run as"
      • for a description of the models see Model Description
    • Additionally the accuracy tests can be executed automatically as Junit-Plugin-Test (only in the Linux binary):
      • Open edu.kit.ipd.sdq.kamp4attack.tests project
      • Navigate in the src folder to edu.kit.ipd.sdq.kamp4attack.tests.casestudies and edu.kit.ipd.sdq.kamp4attack.tests.casestudies.travelplanner.
      • By opening the context menu (right click usually) and "Run as" Junit-Plugin-Test
      • It is important to execute the tests as Plugin Tests since otherwise the dependencies can't be solved
      • For Windows and Mac-User they can run the test by executing mvn clean verify in source/Palladio-Addons-ContextConfidentiality-Analysis/ or use the vm image in case maven does not work

    Executing without the binaries

    • Build each source project with maven
    • Projects generates an updatesite usually in the releng folder in an folder ending with .updatesite
    • These updatesites need to be installed in an eclipse installation. An README can be find in the source analysis source folder for the necessary dependencies

    Model Descripton

    • Target Breach
      • in folder targetBreach
    • Ukrainian Power Grid
      • in folder powerGrid
    • TravelPlanner
      • in folder travelplanner
      • Scenarios in folder Attacker_Propagation_Accuracy:
        1. An Empty Attacker model. The analysis has no attacker, therefore no propagation should happen
        2. The attacker has no attack therefore only the initial component is affected
        3. The attacker has no specific attack but has some stolen credential. Therefore, only the credentials are allowed for the propagation
        4. Propagations based on vulnerabilites. The attacker has attacks for mainly one attack step. To verify that each propagation types work
          1. A Component to a Seff Propagation
          2. A Component to Component Propagtion
          3. The component compromises the resource it is deployed on
          4. The component compromises a remote resource (not the one it is deployed on)
          5. A linking Resource compromises a connected Resource container
          6. A linking Resource compromises a connected component
          7. A resource compromises a connected component
          8. A resource compromises another connected resource
        5. The attacker gains a new credential based on an attack, but can't take full control of the Linking Resource
        6. Tests whether the AttackVector option is considered in the analysis
        7. Tests whether the Privilege option is considered in the analysis

    Resultsmodel

    The ids of the non pcm elements (ServiceRestrictions and CompromisedData) might change for every run, since they are dynamically calculated for each analysis step. However, this is not problematic since they can identified by their other properties.

    Further Information

    Additional information and the current source code can be found at our Github repositories:

    • [Metamodel]https://github.com/FluidTrust/Palladio-Addons-ContextConfidentiality-Metamodel)
    • Analysis
    • Bench-Product
    Show all Show markdown
    Keywords:
    -
    Related information:
    -
    Language:
    -
    Publishers:
    Karlsruhe Institute of Technology
    Production year:
    2022
    Subject areas:
    Computer Science
    Resource type:
    Dataset
    Data source:
    -
    Software used:
    -
    Data processing:
    -
    Publication year:
    2023
    Rights holders:
    Walter, Maximilian https://orcid.org/0000-0003-0358-6644

    Heinrich, Robert

    Reussner, Ralf
    Funding:
    -
    Show all Show less
    Name Storage Metadata Upload Action
    Status:
    Published
    Uploaded by:
    kitopen
    Created on:
    2023-04-20
    Archiving date:
    2023-06-24
    Archive size:
    4.2 GB
    Archive creator:
    kitopen
    Archive checksum:
    a79a8103c68b4ea76b475137521e49e9 (MD5)
    Embargo period:
    -
    DOI: 10.35097/1529
    Publication date: 2023-06-24
    Download Dataset
    Download (4.2 GB)

    Download Metadata
    Statistics
    0
    Views
    0
    Downloads
    Rights statement for the dataset
    This work is licensed under
    Eclipse Public License 2.0
    Cite Dataset
    Walter, Maximilian; Heinrich, Robert; Reussner, Ralf (2023): Dataset - Architectural Attack Propagation Analysis for Identifying Confidentiality Issues. Karlsruhe Institute of Technology. DOI: 10.35097/1529
    • About the Repository
    • Privacy Policy
    • Terms and Conditions
    • Legal Notices
    • Accessibility Declaration
    powered by RADAR
    1.22.10 (f) / 1.16.2 (b) / 1.22.4 (i)

    RADAR4KIT ist ein über das Internet nutzbarer Dienst für die Archivierung und Publikation von Forschungsdaten aus abgeschlossenen wissenschaftlichen Studien und Projekten für Forschende des KIT. Betreiber ist das Karlsruher Institut für Technologie (KIT). RADAR4KIT setzt auf dem von FIZ Karlsruhe angebotenen Dienst RADAR auf. Die Speicherung der Daten findet ausschließlich auf IT-Infrastruktur des KIT am Steinbuch Centre for Computing (SCC) statt.

    Eine inhaltliche Bewertung und Qualitätsprüfung findet ausschließlich durch die Datengeberinnen und Datengeber statt.

    1. Das Nutzungsverhältnis zwischen Ihnen („Datennutzerin“ bzw. „Datennutzer“) und dem KIT erschöpft sich im Download von Datenpaketen oder Metadaten. Das KIT behält sich vor, die Nutzung von RADAR4KIT einzuschränken oder den Dienst ganz einzustellen.
    2. Sofern Sie sich als Datennutzerin oder als Datennutzer registrieren lassen bzw. über Shibboleth legitimieren, kann Ihnen seitens der Datengeberin oder des Datengebers Zugriff auch auf unveröffentlichte Dokumente gewährt werden.
    3. Den Schutz Ihrer persönlichen Daten erklären die Datenschutzbestimmungen.
    4. Das KIT übernimmt für Richtigkeit, Aktualität und Zuverlässigkeit der bereitgestellten Inhalte keine Gewährleistung und Haftung, außer im Fall einer zwingenden gesetzlichen Haftung.
    5. Das KIT stellt Ihnen als Datennutzerin oder als Datennutzer für das Recherchieren in RADAR4KIT und für das Herunterladen von Datenpaketen keine Kosten in Rechnung.
    6. Sie müssen die mit dem Datenpaket verbundenen Lizenzregelungen einhalten.