Product Details

A Tool for Creating Test Scenarios for Industry Applications

Created: 2020

Czech title
Nástroj pro přípravu testů průmyslových aplikací
Type
software
License
In order to use the result by another entity, it is always necessary to acquire a license
License Fee
The licensor does not require a license fee for the result
Authors
Hruška Martin, Ing., Ph.D. (Automata@FIT)
Fiedor Tomáš, Ing., Ph.D. (RG VERIFIT)
Panov Sergey, Ing.
Rozsíval Michal, Ing. (DITS)
Smrčka Aleš, Ing., Ph.D. (DITS)
Tureček Dominik, Bc.
Pospíšil Luboš
Čeleda Pavel
Keywords

automata, digital twin, message abstraction, message classification, modeling, testing

Description

Tyrant is an open source tool, that learns the logs of captured communication and outputs model that can be used to reproduce the run (or its mutation) in form of the so called scenario. Tyrant focuses on digital twins: the simulation and implementation of corresponding factory production environment (corresponding components, information system, ERP systems, etc.). The main use case of the scenarios is meant for testing the individual components in the environment: the machines, the terminals, ERP (Enterprise Resource Planning) systems and the PIS (Production Information System). The tool is mainly meant to be used together with the Kryton tool, developed in Masaryk University, which can orchestrate a set of simulators according to the given scenario, that is inferred by the Tyrant from the input set of logs. The tool (and its process) works in the following phases:    1. A communication in real production is captured either for future testing or      for debugging purposes. This results in the set of logs of messages, where      each message has particular timestamp, issued command, host, target, and set      of data of various formats.   2. Logs are parsed by the Tyrant into the stream of messages. Each message is      classified into a set of clusters of messages, where each cluster is      identified by unique key. The data of the corresponding cluster is      abstracted into the form of abstract trie.   3. The model of the communication is inferred. By default, the model is linear      and reproduces the log 1:1, without any abstractions or reduction.      Optionally, the tool can apply an abstraction (namely height abstraction)      resulting into minimized model, which is user-friendly for manual      inspection.   4. The model is serialized to stream of messages: the output scenario in the      YAML format supported by the Kryton tool. The Kryton then can reproduce the      scenario by sending messages between real (tested) or simulated components.

Location
License Conditions

The software is free under the CC BY NC SA licence (https://creativecommons.org/licenses/by-nc-sa/3.0/)

Projects
KYPO4Industry, TAČR, Národní centra kompetence 1, TN01000077, TN01000077/06, 2019-2020, completed
National Center of Competence for Cybersecurity, TAČR, Národní centra kompetence 1, TN01000077, 2019-2022, completed
Research groups
Departments
Back to top