def get_intrusion_window(adversary_path): adversary_path='C:/Users/substationc/Desktop/DataFusion/DataFusionApp/DataFusionApp/PythonScripts/'+adversary_path fusion = DataFusion() fusion.load_json(adversary_path) fusion.extract_cyber_data() fusion.extract_physical_data() data_to_process = fusion.merge() attack_start = data_to_process.iloc[0]['Time'] start = int(time.mktime(attack_start.timetuple())) attack_end = data_to_process.iloc[-1]['Time'] end = int(time.mktime(attack_end.timetuple())) return start,end
# outstations = case.split('_')[1] # _os = outstations.replace('OS','') # poll_interval = case.split('_')[2] # _pi = poll_interval.replace('poll','') # stage = sys.argv[2] _usecase = 'UC3' _os = '5' _pi = '30' stage = '3' #### based on the stage pack the value of that stage and return#### jsonpath, pickle_path, snort_path, start_time, end_time = get_file_path( _usecase, int(_os), int(_pi)) fusion = DataFusion() fusion.load_json(jsonpath) fusion.extract_cyber_data() data_as_list = [] to_monitor = {} if 'UC1' in _usecase: to_monitor = {'399': [5], '456': [18], '1195': [24], '1200': [27]} elif 'UC2' in _usecase: to_monitor = { '390': [20], '601': [34], '631': [23], '968': [27], '968': [29] } elif 'UC3' in _usecase: