Package NetworkConnectivity
URI: NetworkConnectivity
Description: Model of network routing and network paths.
        (empty)
Signifies that bandwidth used by message flows through an interface cannot be restricted based on their source and/or destination addresses. |
|
Applies to a network or communication channel, signifying that messages in that network or channel can be intercepted and read via passive snooping or via a man-in-the-middle attack. |
|
Applies to a network communication route, i.e. the Interface between a Host and a Subnet, or a Logical Segment representing a route between two Subnets, signifying that by default, messages will be allowed to flow. |
|
The connection from a device to a subnet is really with a spoofed subnet. This means a malicious party is routing between the device and the subnet with which it is supposed to be connected. |
Apply a default firewall rule at gateway host Gateway to drop messages sent via the gateway from FromSubnet to ToSubnet, unless they are service requests or responses. |
|
Apply a default firewall rule at host Host to drop messages sent to the host from subnet LogicalSubnet, unless they are service requests or responses. |
|
Limit the bandwidth for each remote source of communication destined for the network address of Host on LogicalSubnet. |
|
Signifies that device Host will not connect to subnet LogicalSubnet even though such a connection is implied by the system model. This strategy does not represent a contingency plan, but a permanent restriction introduced by design or in accordance with an operational policy or user preference. It also triggers threats representing side effects that would be caused by such a restriction. The most common situation where a connection is possible but is not used is where a mobile device connects to a cellular network which could be done in any location, but the user will avoid it in some locations. |
|
If device Gateway blocks unsolicited connections into private subnet ToSubnet, port forwarding is used to allow access to services by legitimate clients. This strategy may represent a run-time adaptation in response to a threat, or a permanent restriction introduced by design or in accordance with an operational policy or user preference. It also triggers threats representing side effects that would be caused by such a restriction. |
|
Filter DDoS messages to a target in the core network. This normally has to be arranged through the Internet connection service provider, so it is modelled by assigning the corresponding control to the final interface to the Internet. |
Applies to the interface between a device and a subnet, and means the device has a reserved network address (fixed or in a known, restricted range). |
|
A policy is enforced that restricts traffic between source and destination IP addresses. Note that this may be implemented at interfaces other than the one having the destination address. |
|
Measures can be enabled to filter DDoS attacks against the IP address for the interface. Usually this is done in the core network, by an Internet service provider, on behalf of the customer to whom the IP address is assigned. |
|
Means a host does not connect to a network, unless compromised. This is not the same as FWBlock, which represents a policy to drop messages on a live connection. It means the connection is not made in the first place. Typically used where a host connects to a radio network that is implemented in several locations, but should not be used in some of those locations. |
|
Signifies that firewall policy exceptions allowing access to services have been removed. This prevents client-service connections if and only if the default policy is to block other connections. |
|
Means the default policy is to drop messages directed to a network address (interface) or via a network router (logical segment). |
A host that is (or hosts) the source of a message or data flow. |
|
A subnet at the start of a network path or communication channel. |
|
A logical segment representing the forward path for connections via a gateway. |
|
An interface via which communication enters a host from a subnet. |
|
An interface between a host and a logical subnet. |
|
A network path which may or may not be physical. |
|
A logical segment representing a route via a gateway. |
|
A route through a gateway between subnets. |
|
A path through the network, usually between a subnet accessible to attackers and a subnet to which a target host is connected. |
|
A constructed network path. |
|
A pre-existing network path from which other paths will be contructed. |
|
An interface via which communication enters a subnet from a host. |
|
A physical network path. |
|
A logical segment representing the return path for connections via a gateway. |
|
Role assigned to a subpath of some other network path. |
|
A host that is (or hosts) the destination of a message or data flow. |
|
A subnet at the end of a network path or communication channel. |
A route between subnets via a gateway on which messages cannot be routed by default. Subclasses are used to represent cases where messages can be routed, so a route represented by the base class only is one where messages cannot be sent unless they are replies on a previously established connection. |
|
Base class for all assets representing network communications. |
|
A route through a NAT device (or equivalent) from a public subnet to a private one. In an IPv4 network, destination addresses for messages along this route must be translated from public to private addresses. This would normally only happen if the message is a response in a previously established connection from private to public subnets, unless port forwarding is implemented to allow access to specific services. |
|
The interface between a Host and a Logical Subnet. Represents a possible point of control and a target for attack. If the Logical Subnet is an IP network, the Interface also represents the existence of an IP address. |
|
Base class for network paths. |
|
A route through a Host between two connected Logical Subnets along which it is always possible to route messages. |
|
A base class representing a route through a Host between any two distinct Logical Subnets of any kind. |
|
Route through a Host between two distinct Logical Subnets in which the source of the message (e.g. its IP address) is rewritten in transit through the gateway Host. If both subnets are IP networks, this corresponds to SNAT on outbound messages. |
|
Represents a path in the network between two LogicalSubnets. |
|
A route through a Host between two connected Logical Subnets along which it is possible to route messages where the message source need not be obfuscated by any form of network address translation, although the destination address may in some cases be changed from that of the gateway Host. |
|
Represents a path in the network between two LogicalSubnets in which all of the subnets involved are physical. |
Signifies that bandwidth used by message flows through an interface can be restricted based on their source and/or destination addresses. |
|
Applies to a network or a communication channel between processes, signifying that messages cannot be intercepted and read in that network or channel. |
|
Applies to a communication route, i.e. the Interface between a Host and a Subnet, or a Logical Segment representing a route between two Subnets, signifying that by default, messages will be dropped. |
|
The connection from a supplicant device is not an imposter subnet. |