Skip to content

Commit

Permalink
add manual data collection example
Browse files Browse the repository at this point in the history
  • Loading branch information
Limmen committed Feb 13, 2024
1 parent e6e7e3d commit d0ffa31
Show file tree
Hide file tree
Showing 4 changed files with 132 additions and 0 deletions.
20 changes: 20 additions & 0 deletions examples/data_collection/manual_sequences/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
# Traces Collection

This directory contains example scripts for collecting traces and adversary emulation where the actions by the
adversary are configured manually.

## Contents

- Level 9: [./level_9](level_9): this directory contains example scripts for collecting traces from emulation level 9

## Author & Maintainer

Kim Hammar <kimham@kth.se>

## Copyright and license

[LICENSE](../../../LICENSE.md)

Creative Commons

(C) 2020-2024, Kim Hammar
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
results
22 changes: 22 additions & 0 deletions examples/data_collection/manual_sequences/level_9/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# Adversary Emulation and Traces Collection for Emulation Level 9

This directory contains example scripts for collecting traces and adversary emulation for emulation level 9

## Commands

To run a script, execute:
```bash
python <script_name>
```

## Author & Maintainer

Kim Hammar <kimham@kth.se>

## Copyright and license

[LICENSE](../../../LICENSE.md)

Creative Commons

(C) 2020-2024, Kim Hammar
89 changes: 89 additions & 0 deletions examples/data_collection/manual_sequences/level_9/run.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,89 @@
import time
import math
import io
import json
from typing import List, Tuple
from csle_common.util.emulation_util import EmulationUtil
from csle_common.metastore.metastore_facade import MetastoreFacade
import csle_common.constants.constants as constants
from csle_base.encoding.np_encoder import NpEncoder
from csle_cluster.cluster_manager.cluster_controller import ClusterController
from csle_common.logging.log import Logger

if __name__ == '__main__':
emulation = "csle-level9-040"
sleep_time_seconds = 45
executions = MetastoreFacade.list_emulation_executions_for_a_given_emulation(emulation_name=emulation)
if len(executions) == 0:
raise ValueError(f"There is no execution of an emulation with name: {emulation}")

# There must be an executon of level 9 running first, otherwise the list is empty
execution = executions[0]
emulation_env_config = execution.emulation_env_config

# Get external attacker ip
attacker_ip = emulation_env_config.containers_config.get_agent_container().docker_gw_bridge_ip

# Get subnetworks
# This gives a list:
# ['15.9.1.0/24', '15.9.2.0/24', '15.9.3.0/24', '15.9.4.0/24', '15.9.5.0/24', '15.9.6.0/24', '15.9.7.0/24',
# '15.9.8.0/24', '15.9.9.0/24']
subnet_masks = emulation_env_config.topology_config.subnetwork_masks
Logger.__call__().get_logger().info(f"Subnet masks: {subnet_masks}")

# Get external ip of specific container
ftp_1_1_ips = (emulation_env_config.containers_config.get_container_from_full_name("csle_ftp_1_1-level9-15").
docker_gw_bridge_ip)

# Attacker actions
attacker_actions: List[Tuple[str, str]] = [
("echo 'continue'", attacker_ip),
(f"sudo nmap -sS -p- {constants.NMAP.SPEED_ARGS} {subnet_masks[0]}", attacker_ip)
]

data = {}
data["attacker_cmds"] = []
data["attacker_ips"] = []
data["snort_metrics"] = []

for action in attacker_actions:
# Decompose the action
cmd, ip = action

# Connect to host from which the attacker action will be executed
conn = emulation_env_config.connect(ip=ip, username=constants.CSLE_ADMIN.SSH_USER,
pw=constants.CSLE_ADMIN.SSH_PW, create_producer=False)

# Execute actions
start = time.time()
Logger.__call__().get_logger().info(f"Running command: {cmd}, from container with ip {ip}")
EmulationUtil.execute_ssh_cmds(cmds=[cmd], conn=conn, wait_for_completion=True)
Logger.__call__().get_logger().info("Command completed")

# Wait <sleep_time_seconds> to allow data to propagate in the system
Logger.__call__().get_logger().info(f"Sleeping {sleep_time_seconds}s to allow data to propagate in the system")
time.sleep(sleep_time_seconds)
end = time.time()
duration_minutes = math.ceil((end - start) / 60)
Logger.__call__().get_logger().info(f"Collecting measurement data from the last {duration_minutes} minutes")

# Collect measurements
time_series = ClusterController.get_execution_time_series_data(
ip=execution.emulation_env_config.kafka_config.container.physical_host_ip,
port=constants.GRPC_SERVERS.CLUSTER_MANAGER_PORT, minutes=1,
ip_first_octet=execution.ip_first_octet, emulation=execution.emulation_env_config.name)

Logger.__call__().get_logger().info("Data collection complete")

# Populate trace
aggregate_snort_metrics = time_series.agg_snort_ids_metrics[0]
for i in range(1, len(time_series.agg_snort_ids_metrics)):
aggregate_snort_metrics.add(time_series.agg_snort_ids_metrics[i])
data["snort_metrics"].append(aggregate_snort_metrics.to_dict())
data["attacker_ips"].append(ip)
data["attacker_cmds"].append(cmd)

# Save trace to json file
json_str = json.dumps(data, indent=4, sort_keys=True, cls=NpEncoder)
with io.open("/home/kim/trace.json", 'w', encoding='utf-8') as f:
f.write(json_str)

0 comments on commit d0ffa31

Please sign in to comment.