nerability content to webServer.
8 Then the containerRole returns all the federated
VulnerabilityRole instances to the simulator.
In our use case, the returned list of vulnerabilities con-
tains the vulnerability CVE-2014-10021. This vulner-
ability allows remote attackers to execute an arbitrary
code by uploading an executable file. Thanks to this
vulnerability, the attacker obtains full access to the
Web server. Thus the attacker has access to the tar-
get local network, and he can obtain the administrator
account of the Active Directory using Trojan horse.
With this example we illustrate the use of the
shared semantics and highlight the relation between
containerRole and containedRole to ensure the infor-
mation gathering and the update of the role model.
The role model is composed of role classes and be-
havioral methods. These methods act on the DSML
elements, the players, to get and set the element prop-
erties without any copy of these elements. The cre-
ation of playRelation at run time (Step 6 of Figure 7)
allows the federation system to be adapted dynami-
cally to the evolution of the players. As a future work
we would like to try a web based implementation sim-
ilar to WebDPF (Rabbi et al., 2016).
6 CONCLUSION
DSML interoperability remains tedious to obtain and
it is traditionally handled by transformations with po-
tential extensions to have bi-directional transforma-
tions. Our claim is that the model federation approach
facilitates the DSML interoperability issue. In this
paper, we demonstrate that role modeling provides
the capacity to define a shared semantics between the
considered DSMLs. The goal of our role modeling
approaches is to act as a semantics viewpoint on the
model elements.
In this approach, the model elements remain in-
dependent of the federated model and no transforma-
tions are applied. The role model is based on behav-
ioral functions to obtain and set model elements with-
out the creation of intermediate model elements. Our
Role4All metamodel is based on a formalization of
the role concept which provides a clear context of our
work. The framework must be extended to take into
account, for example, dedicated connectors to facili-
tate the interaction with classic data formats such as
JSON.
The case study used to illustrate our approach is
really relevant in the sense that cyber threat analy-
sis requires several tools to improve this kind of criti-
cal analyses. The analysis needs to take into account
many data and metadata on a system, correlate these
data and process the resulting federated data. This ex-
ample must be extended to increase the data sources
but it remains a very interesting field of study for the
federation approach.
ACKNOWLEDGEMENTS
This work is accomplished in the context of a PhD
grant from the French Ministry of Armed Forces and
the Brittany Regional Council.
REFERENCES
Alexander, I. (2003). Misuse cases: Use cases with hostile
intent. IEEE software, 20(1):58–66.
Champeau, J., Leilde, V., and Diallo, P. I. (2013). Model
federation in toolchains. In MODELS Companion
Proceedings.
Conti, M., Dargahi, T., and Dehghantanha, A. (2018). Cy-
ber Threat Intelligence: Challenges and Opportuni-
ties, pages 1–6. Springer International Publishing,
Cham.
Elahi, G., Yu, E., and Zannone, N. (2010). A vulnerability-
centric requirements engineering framework: analyz-
ing security attacks, countermeasures, and require-
ments based on vulnerabilities. Requirements engi-
neering, 15(1):41–62.
Gottlob, G., Schrefl, M., and R
¨
ock, B. (1996). Extending
object-oriented systems with roles. ACM Transactions
on Information Systems (TOIS), 14(3):268–296.
Guychard, C., Guerin, S., Koudri, A., Beugnard, A.,
and Dagnat, F. (2013). Conceptual interoperability
through models federation. In Semantic Information
Federation Community Workshop.
Hemery, D. (2015). PimCa: D
´
efinition du langage. Techni-
cal report, DGA Maitrise de l’Information.
Holik, F., Horalek, J., Marik, O., Neradova, S., and Zitta, S.
(2014). Effective penetration testing with Metasploit
framework and methodologies. In 2014 IEEE 15th In-
ternational Symposium on Computational Intelligence
and Informatics (CINTI), pages 237–242. IEEE.
K
¨
uhn, T., B
¨
ohme, S., G
¨
otz, S., and Aßmann, U. (2015).
A combined formal model for relational context-
dependent roles. In Proceedings of the 2015 ACM
SIGPLAN International Conference on Software Lan-
guage Engineering, pages 113–124. ACM.
K
¨
uhn, T., Leuth
¨
auser, M., G
¨
otz, S., Seidl, C., and Aß-
mann, U. (2014). A metamodel family for role-based
modeling and programming languages. In Interna-
tional Conference on Software Language Engineer-
ing, pages 141–160. Springer.
Lee, W.-S., Grosh, D. L., Tillman, F. A., and Lie, C. H.
(1985). Fault tree analysis, methods, and applica-
tions - a review. IEEE transactions on reliability,
34(3):194–203.
MODELSWARD 2019 - 7th International Conference on Model-Driven Engineering and Software Development
82