Changes between Version 39 and Version 40 of ExDescLang


Ignore:
Timestamp:
Oct 14, 2010 4:30:42 PM (13 years ago)
Author:
sunshine
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • ExDescLang

    v39 v40  
    7878   [[Image(wp2pcomb.jpg)]]
    7979
    80 i.e. each infected host becomes elpeer.
     80i.e. each infected host becomes a peer.
    8181
    8282The system now needs to offer me several generators:
    8383
    8484 * It should offer a topology generator and map the initial infected set, vulnerable set and leader set to the topology that gets generated.
    85  * It should offer event generator for each of the events: scan, infection, yespeer, wannapeer, leaderis, cmd and report. Specifically for scan, yespeer, wannapeer, cmd and report it should offer traffic generators. For infection it should offer malware generator. For leaderis it could either offer a traffic generator or an option to hardcode the leader ID into the peer software.
     85 * It should offer event generator for each of the events: scan, yespeer, wannapeer, leaderis, hello, cmd and report. Specifically for scan, yespeer, wannapeer, hello, cmd and report it should offer traffic generators.  For leaderis it could either offer a traffic generator or an option to hardcode the leader ID into the peer software.
     86 * It should offer a malware generator for vulnerability x
    8687
    8788User either chooses each generator or agrees to use a default one for each choice. User can then manipulate the generators (their parameters) and the workflow. For example the user may add "patched" state after the "infected" one with the "patch" event to make the transition.
     
    9899   [[Image(cpobj.jpg)]]
    99100
    100    (in English: There are attacker and legitimate client nodes, one each. There is one true resource and one fake resource, both are of type Info which means that they are a piece of text someone gives to the legitimate client when it asks for that resource. A cache is simply a collection of Info items, one ore more. Attacker and leg. client are different nodes, and trueresource is different than fakeresource. Cache does not reside at the attacker.)
     101   (in English: There is one attacker node. There is one fake resource, of type Info which means that it is a piece of text that is given to someone upon request. A cache is simply a collection of Info items, one or more. Cache does not reside at the attacker.)
    101102
    102103
    103104 * '''Timeline of events: '''
    104105
    105  
     106  [[Image(cpwf.jpg)]]
    106107
    107108 * '''Invariants:'''