Go to CUI-CPP V2.0 Data Types

1     Definition 2     Functional Requirements 3     Syntax
4     Semantics 5    Conformance Testing 6     Performance Assessment

1      Definition

Risk Descriptors related to Cyber Risks to be processed by the Primary Discontinuity Prediction.

2      Functional Requirements

See Semantics.

3      Syntax

https://schemas.mpai.community/CUI1/V2.0/data/CyberRiskDescriptors.json

4      Semantics

Label Description
Header Cyber Risk Descriptors Header
– Standard-CyberRiskDescriptors The characters “CUI-YRD-V”
– Version Major version – 1 or 2 characters
– Dot-separator The character “.”
– Subversion Minor version – 1 or 2 characters
MInstanceID Identifier of Virtual Space.
CyberRiskDescriptorsTime Time of Cyber Risk Descriptors.
CyberRiskDescriptorsData Set of Risk Descriptors.
– AttackerSourceIP Data of IP of the Source Attacker
  – AttackDetectionTime Time the attack was started or detected.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type IP address.
  – AttackSorceIPAddress IP address of source of attack.
– DoSDestinationIP Data of IP of Destination attack.
  – AttackDetectionTime Time the attack was detected.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type IP address.
  – AttackDestinationIPAddress IP address of attack destination.
– SourcePort Data of Port originating the attack.
  – AttackDetectionTime Time the attack data flow was started or detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type Port Number.
  – AttachSourcePortNumber Port number from which the packet was sent.
– DestinationPort Data of Port under attack.
  – AttackDetectionTime Time the attack data flow was started or detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type Port Number.
  – AttackDestinationPortNumber The port number to which the packet is directed.
– Protocol Data of Protocol used by the attacker.
  – AttackDetectionTime Time of attack.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type Protocol.
  – CommunicationProtocol Protocol name and version.
– Duration Data of attack duration
  – StartAndEndTime Start and End.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type Continuous or discontinuous.
  – AttackDuration Attack duration.
– Packets Data of attack packets.
  – AttackDetectionTime Time the attack was detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type Packet size.
  – TransmittedPacktetsNumber Number of transmitted packets.
– RequestFrequency Data of Frequency of HTTP Requests.
  – AttackDetectionTime Time attack was detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type Attack frequency.
  – OccurrenceOfFlowRate Frequency of attack data flows.
– IPAddressEntropy Data of IP Address Entropy
  – AttackDetectionTime Time attack was detected.
  – VectorProviderOrSource Provider of input vector or external source.
  – Type Type of entropy (if available)
  – SourceDiversity Parameters related to attack entropy.
– TCPFlag Data related to TCP packets.
  – AttackDetectionTime Time attack was detected.
  – Vector ProviderOrSource Provider of input vector or external source.
  – Type TCP Packet Flag.
  – TCPPacketsFlag Flags of TCP packets.

5     Conformance Testing

A Data instance Conforms with Cyber Risk Descriptors (CUI-YRD) V2.0 if:

  1.  Its JSON Object validates against its JSON Schema.
  2. Any included  JSON Object validates against its JSON Schema.
  3. All Data in the JSON Object have the specified Data Types.

6     Performance Assessment