Package NetworkConnectivity

URI: NetworkConnectivity

Description: Model of network routing and network paths.

        (empty)

BandwidthUnmanaged

Signifies that bandwidth used by message flows through an interface cannot be restricted based on their source and/or destination addresses.

CommsSnoopable

Applies to a network or communication channel, signifying that messages in that network or channel can be intercepted and read via passive snooping or via a man-in-the-middle attack.

ConnectionsAllowed

Applies to a network communication route, i.e. the Interface between a Host and a Subnet, or a Logical Segment representing a route between two Subnets, signifying that by default, messages will be allowed to flow.

NetworkSpoofing

The connection from a device to a subnet is really with a spoofed subnet. This means a malicious party is routing between the device and the subnet with which it is supposed to be connected.

CSG-BlockGatewayRoute

Apply a default firewall rule at gateway host Gateway to drop messages sent via the gateway from FromSubnet to ToSubnet, unless they are service requests or responses.

CSG-BlockInterface

Apply a default firewall rule at host Host to drop messages sent to the host from subnet LogicalSubnet, unless they are service requests or responses.

CSG-BWManagementAtInterface

Limit the bandwidth for each remote source of communication destined for the network address of Host on LogicalSubnet.

CSG-DisableNetworkConnection

Signifies that device Host will not connect to subnet LogicalSubnet even though such a connection is implied by the system model. This strategy does not represent a contingency plan, but a permanent restriction introduced by design or in accordance with an operational policy or user preference. It also triggers threats representing side effects that would be caused by such a restriction. The most common situation where a connection is possible but is not used is where a mobile device connects to a cellular network which could be done in any location, but the user will avoid it in some locations.

CSG-DisablePortForwarding-Runtime

If device Gateway blocks unsolicited connections into private subnet ToSubnet, port forwarding is used to allow access to services by legitimate clients. This strategy may represent a run-time adaptation in response to a threat, or a permanent restriction introduced by design or in accordance with an operational policy or user preference. It also triggers threats representing side effects that would be caused by such a restriction.

CSG-FilterDosAtInterface

Filter DDoS messages to a target in the core network. This normally has to be arranged through the Internet connection service provider, so it is modelled by assigning the corresponding control to the final interface to the Internet.

AddressReservation

Applies to the interface between a device and a subnet, and means the device has a reserved network address (fixed or in a known, restricted range).

BandwidthManagement

A policy is enforced that restricts traffic between source and destination IP addresses. Note that this may be implemented at interfaces other than the one having the destination address.

DDoSFiltering

Measures can be enabled to filter DDoS attacks against the IP address for the interface. Usually this is done in the core network, by an Internet service provider, on behalf of the customer to whom the IP address is assigned.

DisableInterface

Means a host does not connect to a network, unless compromised. This is not the same as FWBlock, which represents a policy to drop messages on a live connection. It means the connection is not made in the first place. Typically used where a host connects to a radio network that is implemented in several locations, but should not be used in some of those locations.

DisableServiceAccess

Signifies that firewall policy exceptions allowing access to services have been removed. This prevents client-service connections if and only if the default policy is to block other connections.

FWBlock

Means the default policy is to drop messages directed to a network address (interface) or via a network router (logical segment).

Role_FromHost

A host that is (or hosts) the source of a message or data flow.

Role_FromSubnet

A subnet at the start of a network path or communication channel.

Role_FwdSegment

A logical segment representing the forward path for connections via a gateway.

Role_InboundIF

An interface via which communication enters a host from a subnet.

Role_Interface

An interface between a host and a logical subnet.

Role_LogicalPath

A network path which may or may not be physical.

Role_LogicalRoute

A logical segment representing a route via a gateway.

Role_LogicalSegment

A route through a gateway between subnets.

Role_NetworkPath

A path through the network, usually between a subnet accessible to attackers and a subnet to which a target host is connected.

Role_NewPath

A constructed network path.

Role_OldPath

A pre-existing network path from which other paths will be contructed.

Role_OutboundIF

An interface via which communication enters a subnet from a host.

Role_PhysicalPath

A physical network path.

Role_RetSegment

A logical segment representing the return path for connections via a gateway.

Role_SubPath

Role assigned to a subpath of some other network path.

Role_ToHost

A host that is (or hosts) the destination of a message or data flow.

Role_ToSubnet

A subnet at the end of a network path or communication channel.

ClosedSegment

A route between subnets via a gateway on which messages cannot be routed by default. Subclasses are used to represent cases where messages can be routed, so a route represented by the base class only is one where messages cannot be sent unless they are replies on a previously established connection.

CommsAsset

Base class for all assets representing network communications.

DeNATSegment

A route through a NAT device (or equivalent) from a public subnet to a private one. In an IPv4 network, destination addresses for messages along this route must be translated from public to private addresses. This would normally only happen if the message is a response in a previously established connection from private to public subnets, unless port forwarding is implemented to allow access to specific services.

Interface

The interface between a Host and a Logical Subnet. Represents a possible point of control and a target for attack. If the Logical Subnet is an IP network, the Interface also represents the existence of an IP address.

LogicalPath

Base class for network paths.

LogicalRoute

A route through a Host between two connected Logical Subnets along which it is always possible to route messages.

LogicalSegment

A base class representing a route through a Host between any two distinct Logical Subnets of any kind.

NATSegment

Route through a Host between two distinct Logical Subnets in which the source of the message (e.g. its IP address) is rewritten in transit through the gateway Host. If both subnets are IP networks, this corresponds to SNAT on outbound messages.

NetworkPath

Represents a path in the network between two LogicalSubnets.

OpenSegment

A route through a Host between two connected Logical Subnets along which it is possible to route messages where the message source need not be obfuscated by any form of network address translation, although the destination address may in some cases be changed from that of the gateway Host.

PhysicalPath

Represents a path in the network between two LogicalSubnets in which all of the subnets involved are physical.

BandwidthManaged

Signifies that bandwidth used by message flows through an interface can be restricted based on their source and/or destination addresses.

ChannelConfidentiality

Applies to a network or a communication channel between processes, signifying that messages cannot be intercepted and read in that network or channel.

ConnectionsBlocked

Applies to a communication route, i.e. the Interface between a Host and a Subnet, or a Logical Segment representing a route between two Subnets, signifying that by default, messages will be dropped.

NetworkAuthenticity

The connection from a supplicant device is not an imposter subnet.