Product Details

Nástroj pro přípravu testů průmyslových aplikací

Created: 2020

Czech title
Nástroj pro přípravu testů průmyslových aplikací
Type
software
License
In order to use the result by another entity, it is always necessary to acquire a license
License Fee
The licensor does not require a license fee for the result
Authors
Hruška Martin, Ing., Ph.D. (Automata@FIT)
Fiedor Tomáš, Ing., Ph.D. (RG VERIFIT)
Panov Sergey, Ing.
Rozsíval Michal, Ing. (DITS)
Smrčka Aleš, Ing., Ph.D. (DITS)
Tureček Dominik, Bc.
Pospíšil Luboš
Čeleda Pavel
Keywords

automata,
digital twin,
message abstraction,
message classification,
modeling,
testing

Description

Tyrant is an open source tool, that learns the logs of captured communication and
outputs model that can be used to reproduce the run (or its mutation) in form of
the so called scenario. Tyrant focuses on digital twins: the simulation and
implementation of corresponding factory production environment (corresponding
components, information system, ERP systems, etc.).

The main use case of the scenarios is meant for testing the individual components
in the environment: the machines, the terminals, ERP (Enterprise Resource
Planning) systems and the PIS (Production Information System).

The tool is mainly meant to be used together with the Kryton tool, developed in
Masaryk University, which can orchestrate a set of simulators according to the
given scenario, that is inferred by the Tyrant from the input set of logs.

The tool (and its process) works in the following phases: 

  1. A communication in real production is captured either for future testing or
     for debugging purposes. This results in the set of logs of messages, where
     each message has particular timestamp, issued command, host, target, and set
     of data of various formats.
  2. Logs are parsed by the Tyrant into the stream of messages. Each message is
     classified into a set of clusters of messages, where each cluster is
     identified by unique key. The data of the corresponding cluster is
     abstracted into the form of abstract trie.
  3. The model of the communication is inferred. By default, the model is linear
     and reproduces the log 1:1, without any abstractions or reduction.
     Optionally, the tool can apply an abstraction (namely height abstraction)
     resulting into minimized model, which is user-friendly for manual
     inspection.
  4. The model is serialized to stream of messages: the output scenario in the
     YAML format supported by the Kryton tool. The Kryton then can reproduce the
     scenario by sending messages between real (tested) or simulated components.

Location
License Conditions

The software is free under the CC BY NC SA licence (https://creativecommons.org/licenses/by-nc-sa/3.0/)

Projects
KYPO4Industry, TAČR, Národní centra kompetence 1, TN01000077, TN01000077/06, start: 2019-08-01, end: 2020-12-31, completed
National Center of Competence for Cybersecurity, TAČR, Národní centra kompetence 1, TN01000077, start: 2019-01-01, end: 2022-12-31, completed
Research groups
Departments
Back to top