Search in sources :

Example 1 with SystemModel

use of com.ge.verdict.attackdefensecollector.model.SystemModel in project VERDICT by ge-high-assurance.

the class VerdictSynthesisTest method partialSolutionTest.

@Test
public void partialSolutionTest() {
    CostModel costModel = new CostModel(new File(getClass().getResource("partialCosts.xml").getPath()));
    int dal = 2;
    SystemModel system = new SystemModel("C1");
    Attack attack1 = new Attack(system.getAttackable(), "A1", "An attack", Prob.certain(), CIA.I);
    Defense defense1 = new Defense(attack1);
    defense1.addDefenseClause(Collections.singletonList(new Defense.DefenseLeaf("D1", Optional.of(new com.ge.verdict.attackdefensecollector.Pair<>("D1", 1)))));
    ADTree adtree = new ADOr(new ADAnd(new ADNot(defense1), attack1));
    for (Approach approach : Approach.values()) {
        {
            DLeaf.Factory factoryPartial = new DLeaf.Factory();
            Optional<Pair<Set<ComponentDefense>, Double>> resultPartial = VerdictSynthesis.performSynthesisSingle(DTreeConstructor.construct(adtree, costModel, dal, true, false, factoryPartial), dal, factoryPartial, approach);
            Assertions.assertThat(resultPartial.isPresent());
            Assertions.assertThat(resultPartial.get().right).isEqualTo(1);
        }
        {
            DLeaf.Factory factoryTotal = new DLeaf.Factory();
            Optional<Pair<Set<ComponentDefense>, Double>> resultTotal = VerdictSynthesis.performSynthesisSingle(DTreeConstructor.construct(adtree, costModel, dal, false, false, factoryTotal), dal, factoryTotal, approach);
            Assertions.assertThat(resultTotal.isPresent());
            Assertions.assertThat(resultTotal.get().right).isEqualTo(2);
        }
    }
}
Also used : DLeaf(com.ge.verdict.synthesis.dtree.DLeaf) Set(java.util.Set) ADNot(com.ge.verdict.attackdefensecollector.adtree.ADNot) Optional(java.util.Optional) ADAnd(com.ge.verdict.attackdefensecollector.adtree.ADAnd) Attack(com.ge.verdict.attackdefensecollector.adtree.Attack) Defense(com.ge.verdict.attackdefensecollector.adtree.Defense) ComponentDefense(com.ge.verdict.synthesis.dtree.DLeaf.ComponentDefense) ADTree(com.ge.verdict.attackdefensecollector.adtree.ADTree) SystemModel(com.ge.verdict.attackdefensecollector.model.SystemModel) Approach(com.ge.verdict.synthesis.VerdictSynthesis.Approach) ADOr(com.ge.verdict.attackdefensecollector.adtree.ADOr) File(java.io.File) Pair(com.ge.verdict.synthesis.util.Pair) Test(org.junit.Test)

Example 2 with SystemModel

use of com.ge.verdict.attackdefensecollector.model.SystemModel in project VERDICT by ge-high-assurance.

the class VerdictSynthesisTest method unmitigatedMixedTest.

@Test
public void unmitigatedMixedTest() {
    DLeaf.Factory factory = new DLeaf.Factory();
    SystemModel system = new SystemModel("S1");
    int targetDal = 1;
    Fraction[] costs = Util.fractionCosts(new double[] { 5, 5, 5, 5, 5, 5, 5, 5, 5, 5 });
    DLeaf dleaf = new DLeaf("S1", "D1", "A2", 0, targetDal, costs, factory);
    DTree dtree = new DOr(new ALeaf(new Attack(system.getAttackable(), "A1", "An attack", Prob.certain(), CIA.I)), dleaf);
    for (Approach approach : Approach.values()) {
        Optional<Pair<Set<ComponentDefense>, Double>> result = VerdictSynthesis.performSynthesisSingle(dtree, targetDal, factory, approach);
        Assertions.assertThat(result.isPresent());
        Assertions.assertThat(result.get().left).hasSize(1);
        Assertions.assertThat(result.get().left).contains(dleaf.componentDefense);
        Assertions.assertThat(result.get().right).isEqualTo(5);
    }
}
Also used : DLeaf(com.ge.verdict.synthesis.dtree.DLeaf) DTree(com.ge.verdict.synthesis.dtree.DTree) ADTree(com.ge.verdict.attackdefensecollector.adtree.ADTree) ADOr(com.ge.verdict.attackdefensecollector.adtree.ADOr) DOr(com.ge.verdict.synthesis.dtree.DOr) ALeaf(com.ge.verdict.synthesis.dtree.ALeaf) Fraction(org.apache.commons.math3.fraction.Fraction) Attack(com.ge.verdict.attackdefensecollector.adtree.Attack) SystemModel(com.ge.verdict.attackdefensecollector.model.SystemModel) ComponentDefense(com.ge.verdict.synthesis.dtree.DLeaf.ComponentDefense) Approach(com.ge.verdict.synthesis.VerdictSynthesis.Approach) Pair(com.ge.verdict.synthesis.util.Pair) Test(org.junit.Test)

Example 3 with SystemModel

use of com.ge.verdict.attackdefensecollector.model.SystemModel in project VERDICT by ge-high-assurance.

the class VerdictSynthesisTest method unmitigatedTest.

@Test
public void unmitigatedTest() {
    DLeaf.Factory factory = new DLeaf.Factory();
    SystemModel system = new SystemModel("S1");
    DTree dtree = new ALeaf(new Attack(system.getAttackable(), "A1", "An attack", Prob.certain(), CIA.I));
    for (Approach approach : Approach.values()) {
        Assertions.assertThat(VerdictSynthesis.performSynthesisSingle(dtree, 1, factory, approach)).isEmpty();
    }
}
Also used : DLeaf(com.ge.verdict.synthesis.dtree.DLeaf) SystemModel(com.ge.verdict.attackdefensecollector.model.SystemModel) DTree(com.ge.verdict.synthesis.dtree.DTree) ADTree(com.ge.verdict.attackdefensecollector.adtree.ADTree) ALeaf(com.ge.verdict.synthesis.dtree.ALeaf) Approach(com.ge.verdict.synthesis.VerdictSynthesis.Approach) Attack(com.ge.verdict.attackdefensecollector.adtree.Attack) Test(org.junit.Test)

Example 4 with SystemModel

use of com.ge.verdict.attackdefensecollector.model.SystemModel in project VERDICT by ge-high-assurance.

the class AttackDefenseCollector method loadAttacksDefensesFromCsv.

/**
 * Load the attacks and defenses from CAPEC.csv and Defenses.csv, respectively.
 *
 * <p>This is factored out because it is used by both the CSV and VDM approaches.
 *
 * @param inputDir the STEM output directory
 * @param connectionNameMap the map from connection names in the CSV files to the actual
 *     connection names
 * @throws CSVFile.MalformedInputException
 * @throws IOException
 */
private void loadAttacksDefensesFromCsv(String inputDir, Map<String, String> connectionNameMap) throws CSVFile.MalformedInputException, IOException {
    // Load all the files as CSV
    CSVFile capecCsv = new CSVFile(new File(inputDir, "CAPEC.csv"), true, "CompType", "CompInst", "CAPEC", "CAPECDescription", "Confidentiality", "Integrity", "Availability", "LikelihoodOfSuccess");
    CSVFile defensesCsv = new CSVFile(new File(inputDir, "Defenses.csv"), true, "CompType", "CompInst", "CAPEC", "Confidentiality", "Integrity", "Availability", "ApplicableDefenseProperties", "ImplProperties", "DAL");
    // Load attacks
    for (CSVFile.RowData row : capecCsv.getRowDatas()) {
        String systemTypeName = row.getCell("CompType");
        String systemInstName = row.getCell("CompInst");
        String attackName = row.getCell("CAPEC");
        String attackDesc = row.getCell("CAPECDescription");
        Prob likelihood = Prob.certain();
        // Look at all three columns to figure out which one is being used
        CIA cia = CIA.fromStrings(row.getCell("Confidentiality"), row.getCell("Integrity"), row.getCell("Availability"));
        if ("Connection".equals(systemTypeName)) {
            String connectionName = connectionNameMap.get(systemInstName);
            for (ConnectionModel connection : connNameToConnectionModelMap.get(connectionName)) {
                connection.getAttackable().addAttack(new Attack(connection.getAttackable(), attackName, attackDesc, likelihood, cia));
            }
        } else {
            SystemModel system = getSystem(systemInstName);
            system.getAttackable().addAttack(new Attack(system.getAttackable(), attackName, attackDesc, likelihood, cia));
        }
    }
    // Note we don't use implemented property column in csv files if we vdm as input
    for (CSVFile.RowData row : defensesCsv.getRowDatas()) {
        String systemTypeName = row.getCell("CompType");
        String systemInstName = row.getCell("CompInst");
        String attackName = row.getCell("CAPEC");
        CIA cia = CIA.fromStrings(row.getCell("Confidentiality"), row.getCell("Integrity"), row.getCell("Availability"));
        List<String> defenseNames = Arrays.asList(row.getCell("ApplicableDefenseProperties").split(";")).stream().map(name -> name.length() > 0 ? Character.toString(name.charAt(0)).toLowerCase() + name.substring(1) : "").collect(Collectors.toList());
        List<String> implProps = Arrays.asList(row.getCell("ImplProperties").split(";"));
        List<String> likelihoodStrings = Arrays.asList(row.getCell("DAL").split(";"));
        if (defenseNames.size() != implProps.size() || defenseNames.size() != likelihoodStrings.size()) {
            throw new RuntimeException("ApplicableDefenseProperties, ImplProperties, and DAL must have same cardinality");
        }
        List<Defense> defenses = new ArrayList<>();
        List<Defense.DefenseLeaf> clause = new ArrayList<>();
        if ("Connection".equals(systemTypeName)) {
            String connectionName = connectionNameMap.get(systemInstName);
            for (ConnectionModel connection : connNameToConnectionModelMap.get(connectionName)) {
                Defense defense = connection.getAttackable().getDefenseByAttackAndCia(attackName, cia);
                if (defense == null) {
                    Attack attack = connection.getAttackable().getAttackByNameAndCia(attackName, cia);
                    if (attack == null) {
                        throw new RuntimeException("could not find attack: " + attackName + ", " + cia);
                    }
                    defense = new Defense(attack);
                    connection.getAttackable().addDefense(defense);
                }
                defenses.add(defense);
            }
        } else {
            SystemModel system = getSystem(systemInstName);
            Defense defense = system.getAttackable().getDefenseByAttackAndCia(attackName, cia);
            if (defense == null) {
                Attack attack = system.getAttackable().getAttackByNameAndCia(attackName, cia);
                if (attack == null) {
                    throw new RuntimeException("could not find attack: " + attackName + ", " + cia);
                }
                defense = new Defense(attack);
                system.getAttackable().addDefense(defense);
            }
            defenses.add(defense);
        }
        // TODO get defense descriptions from Defenses2NIST?
        // Need to get correct name if connection
        String entityName = "Connection".equals(systemTypeName) ? connectionNameMap.get(systemInstName) : systemInstName;
        for (int i = 0; i < defenseNames.size(); i++) {
            if (!"null".equals(defenseNames.get(i))) {
                int dal = -1;
                // it will be null if we are not loading from VDM
                if (compDefenseToImplDal != null) {
                    // load DAL from VDM if available
                    Pair<String, String> pair = new Pair<>(entityName, defenseNames.get(i));
                    if (compDefenseToImplDal.containsKey(pair)) {
                        dal = compDefenseToImplDal.get(pair);
                    } else {
                        // if there is no binding present, then it is not implemented
                        dal = 0;
                    }
                }
                // this code treats applicable defense and impl defense as separate things
                // but we have changed the capitalization so that they should be the same
                Optional<Pair<String, Integer>> impl;
                if (dal == -1) {
                    impl = "null".equals(implProps.get(i)) ? Optional.empty() : Optional.of(new Pair<>(implProps.get(i), Integer.parseInt(likelihoodStrings.get(i))));
                } else {
                    impl = dal == 0 ? Optional.empty() : Optional.of(new Pair<>(defenseNames.get(i), dal));
                }
                clause.add(new Defense.DefenseLeaf(defenseNames.get(i), impl));
            }
        }
        // And there are potentially multiple such rows, forming a DNF
        for (Defense defense : defenses) {
            defense.addDefenseClause(clause);
        }
    }
}
Also used : CIA(com.ge.verdict.attackdefensecollector.model.CIA) CyberNot(com.ge.verdict.attackdefensecollector.model.CyberNot) CIAPort(verdict.vdm.vdm_model.CIAPort) Arrays(java.util.Arrays) VdmTranslator(com.ge.verdict.vdm.VdmTranslator) ADOr(com.ge.verdict.attackdefensecollector.adtree.ADOr) CyberAnd(com.ge.verdict.attackdefensecollector.model.CyberAnd) CyberRel(com.ge.verdict.attackdefensecollector.model.CyberRel) HashMap(java.util.HashMap) CyberReq(com.ge.verdict.attackdefensecollector.model.CyberReq) ArrayList(java.util.ArrayList) GenericAttribute(verdict.vdm.vdm_data.GenericAttribute) Attack(com.ge.verdict.attackdefensecollector.adtree.Attack) LinkedHashMap(java.util.LinkedHashMap) Model(verdict.vdm.vdm_model.Model) Defense(com.ge.verdict.attackdefensecollector.adtree.Defense) DefenseProperties(com.ge.verdict.vdm.DefenseProperties) Map(java.util.Map) Connection(verdict.vdm.vdm_model.Connection) ComponentType(verdict.vdm.vdm_model.ComponentType) ADTree(com.ge.verdict.attackdefensecollector.adtree.ADTree) CyberExpr(com.ge.verdict.attackdefensecollector.model.CyberExpr) SystemModel(com.ge.verdict.attackdefensecollector.model.SystemModel) ComponentImpl(verdict.vdm.vdm_model.ComponentImpl) CyberOr(com.ge.verdict.attackdefensecollector.model.CyberOr) Collection(java.util.Collection) Set(java.util.Set) IOException(java.io.IOException) ComponentInstance(verdict.vdm.vdm_model.ComponentInstance) ConnectionModel(com.ge.verdict.attackdefensecollector.model.ConnectionModel) Collectors(java.util.stream.Collectors) File(java.io.File) List(java.util.List) Severity(verdict.vdm.vdm_model.Severity) Optional(java.util.Optional) Collections(java.util.Collections) PortConcern(com.ge.verdict.attackdefensecollector.model.PortConcern) Mission(verdict.vdm.vdm_model.Mission) ArrayList(java.util.ArrayList) Attack(com.ge.verdict.attackdefensecollector.adtree.Attack) Defense(com.ge.verdict.attackdefensecollector.adtree.Defense) SystemModel(com.ge.verdict.attackdefensecollector.model.SystemModel) CIA(com.ge.verdict.attackdefensecollector.model.CIA) ConnectionModel(com.ge.verdict.attackdefensecollector.model.ConnectionModel) File(java.io.File)

Example 5 with SystemModel

use of com.ge.verdict.attackdefensecollector.model.SystemModel in project VERDICT by ge-high-assurance.

the class AttackDefenseCollector method perform.

/**
 * Trace all cyber requirements, build attack-defense tree, and calculate probabilities for the
 * loaded model.
 *
 * <p>The bulk of the work is actually done in SystemModel::trace and ConnectionModel::trace.
 */
public List<Result> perform() {
    List<Result> output = new ArrayList<>();
    // We are also ignoring whether or not the cyber requirement is in a mission
    for (SystemModel system : sysNameToSystemModelMap.values()) {
        for (CyberReq cyberReq : system.getCyberReqs()) {
            Optional<ADTree> treeOpt = system.trace(cyberReq.getCondition());
            // Crush the tree to remove redundant nodes
            ADTree crushed = treeOpt.isPresent() ? treeOpt.get().crush() : new ADOr(Collections.emptyList(), true);
            // not enabling this for now because it is potentially inefficient
            // ADTree adtree = CutSetGenerator.generate(crushed);
            ADTree adtree = crushed;
            // Compute probability of attack
            Prob computed = adtree.compute();
            output.add(new Result(system, cyberReq, adtree, computed));
        }
    }
    return output;
}
Also used : ADTree(com.ge.verdict.attackdefensecollector.adtree.ADTree) SystemModel(com.ge.verdict.attackdefensecollector.model.SystemModel) CyberReq(com.ge.verdict.attackdefensecollector.model.CyberReq) ArrayList(java.util.ArrayList) ADOr(com.ge.verdict.attackdefensecollector.adtree.ADOr)

Aggregations

SystemModel (com.ge.verdict.attackdefensecollector.model.SystemModel)12 ADTree (com.ge.verdict.attackdefensecollector.adtree.ADTree)11 Attack (com.ge.verdict.attackdefensecollector.adtree.Attack)10 ADOr (com.ge.verdict.attackdefensecollector.adtree.ADOr)9 DLeaf (com.ge.verdict.synthesis.dtree.DLeaf)9 Test (org.junit.Test)9 File (java.io.File)8 Defense (com.ge.verdict.attackdefensecollector.adtree.Defense)7 DTree (com.ge.verdict.synthesis.dtree.DTree)7 ADAnd (com.ge.verdict.attackdefensecollector.adtree.ADAnd)6 ADNot (com.ge.verdict.attackdefensecollector.adtree.ADNot)6 DOr (com.ge.verdict.synthesis.dtree.DOr)5 Fraction (org.apache.commons.math3.fraction.Fraction)5 CyberReq (com.ge.verdict.attackdefensecollector.model.CyberReq)4 ALeaf (com.ge.verdict.synthesis.dtree.ALeaf)4 DAnd (com.ge.verdict.synthesis.dtree.DAnd)4 Approach (com.ge.verdict.synthesis.VerdictSynthesis.Approach)3 ComponentDefense (com.ge.verdict.synthesis.dtree.DLeaf.ComponentDefense)3 Pair (com.ge.verdict.synthesis.util.Pair)3 AttackDefenseCollector (com.ge.verdict.attackdefensecollector.AttackDefenseCollector)2