Revamped related works

This commit is contained in:
Noah L. Schrick 2023-04-25 02:20:24 -05:00
parent e1e32c6b5c
commit 6fd055c3fc
7 changed files with 169 additions and 85 deletions

View File

@ -14,6 +14,63 @@
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@ARTICLE{7087377,
author={Kaynar, Kerem and Sivrikaya, Fikret},
journal={IEEE Transactions on Dependable and Secure Computing},
title={Distributed Attack Graph Generation},
year={2016},
volume={13},
number={5},
pages={519-532},
doi={10.1109/TDSC.2015.2423682}
}
@INPROCEEDINGS{LAPA,
author={Yi, Feng and Cai, Huang Yi and Xin, Fu Zheng},
booktitle={2018 IEEE International Conference on Networking, Architecture and Storage (NAS)},
title={A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack},
year={2018},
volume={},
number={},
pages={1-4},
doi={10.1109/NAS.2018.8515733}
}
@INPROCEEDINGS{AG-Sample,
author={Subasi, Omer and Purohit, Sumit and Bhattacharya, Arnab and Chatterjee, Samrat},
booktitle={2022 IEEE International Symposium on Technologies for Homeland Security (HST)},
title={Impact-Driven Sampling Strategies for Hybrid Attack Graphs},
year={2022},
volume={},
number={},
pages={1-7},
doi={10.1109/HST56032.2022.10025439}
}
@INPROCEEDINGS{GraphDB,
author={Simon-Nagy, Gabriella and Fleiner, Rita and Bánáti, Anna},
booktitle={2022 IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY)},
title={Attack Graph Implementation in Graph Database},
year={2022},
volume={},
number={},
pages={000127-000132},
doi={10.1109/SISY56759.2022.10036309}
}
@INPROCEEDINGS{Graph-DB,
author={Yuan, Bintao and Pan, Zulie and Shi, Fan and Li, Zhenhan},
booktitle={2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)},
title={An Attack Path Generation Methods Based on Graph Database},
year={2020},
volume={1},
number={},
pages={1905-1910},
doi={10.1109/ITNEC48623.2020.9085039}
}
@book{hursey2010coordinated,
title={Coordinated checkpoint/restart process fault tolerance for MPI applications on HPC systems},
author={Hursey, Joshua},
@ -77,7 +134,7 @@
file = {Graph Analysis With High-Performance Computing:/home/noah/Zotero/storage/T84DCNCC/Graph Analysis With High-Performance Computing.pdf:application/pdf},
}
@phdthesis{cook_rage_2018,
@mastersthesis{cook_rage_2018,
title = {{RAGE}: {The} {Rage} {Attack} {Graph} {Engine}},
author = {Cook, Kyle},
school = {The {University} of {Tulsa}},

View File

@ -37,9 +37,14 @@
\newlabel{sec:Intro}{{I}{1}{Introduction}{section.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {II}Related Work}{1}{section.2}\protected@file@percent }
\newlabel{sec:Rel-Works}{{II}{1}{Related Work}{section.2}{}}
\citation{GraphDB}
\citation{Graph-DB}
\citation{ou_scalable_2006}
\citation{LAPA}
\citation{cook_scalable_2016}
\citation{li_concurrency_2019}
\citation{AG-Sample}
\citation{7087377}
\citation{cook_rage_2018}
\citation{li_concurrency_2019}
\citation{li_combining_2019}
@ -57,7 +62,6 @@
\citation{CR-Simple}
\bibdata{Bibliography}
\bibcite{schneier_modeling_1999}{1}
\bibcite{j_hale_compliance_nodate}{2}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Time Taken to Checkpoint as the Size of the Instance Grows}}{4}{figure.2}\protected@file@percent }
\newlabel{fig:inst-time}{{2}{4}{Time Taken to Checkpoint as the Size of the Instance Grows}{figure.2}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Time Taken to Checkpoint as the Size of the Frontier Grows}}{4}{figure.3}\protected@file@percent }
@ -65,7 +69,7 @@
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Time Taken to Restart as the Size of the Frontier Grows}}{4}{figure.4}\protected@file@percent }
\newlabel{fig:front-rest-time}{{4}{4}{Time Taken to Restart as the Size of the Frontier Grows}{figure.4}{}}
\@writefile{toc}{\contentsline {section}{\numberline {V}Conclusions and Future Work}{4}{section.5}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{References}{4}{section*.1}\protected@file@percent }
\bibcite{j_hale_compliance_nodate}{2}
\bibcite{cook_rage_2018}{3}
\bibcite{berry_graph_2007}{4}
\bibcite{zhang_boosting_2017}{5}
@ -76,9 +80,15 @@
\bibcite{SCR}{10}
\bibcite{dmtcp}{11}
\bibcite{BLCR}{12}
\bibcite{cook_scalable_2016}{13}
\bibcite{li_concurrency_2019}{14}
\bibcite{li_combining_2019}{15}
\bibcite{CR-Simple}{16}
\bibcite{GraphDB}{13}
\bibcite{Graph-DB}{14}
\bibcite{LAPA}{15}
\bibcite{cook_scalable_2016}{16}
\bibcite{li_concurrency_2019}{17}
\bibcite{AG-Sample}{18}
\bibcite{7087377}{19}
\bibcite{li_combining_2019}{20}
\bibcite{CR-Simple}{21}
\bibstyle{ieeetr}
\@writefile{toc}{\contentsline {section}{References}{5}{section*.1}\protected@file@percent }
\gdef \@abspage@last{5}

View File

@ -10,8 +10,8 @@ B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
\newblock U.S. Patent Number 9,471,789, Oct. 18, 2016.
\bibitem{cook_rage_2018}
K.~Cook, {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}.
\newblock PhD thesis, The {University} of {Tulsa}, 2018.
K.~Cook, ``{RAGE}: {The} {Rage} {Attack} {Graph} {Engine},'' Master's thesis,
The {University} of {Tulsa}, 2018.
\bibitem{berry_graph_2007}
J.~Berry and B.~Hendrickson, ``Graph {Analysis} with {High} {Performance}
@ -58,6 +58,23 @@ J.~Ansel, K.~Arya, and G.~Cooperman, ``Dmtcp: Transparent checkpointing for
J.~Duell, P.~H. Hargrove, and E.~S. Roman, ``Requirements for linux
checkpoint/restart,'' 2 2002.
\bibitem{GraphDB}
G.~Simon-Nagy, R.~Fleiner, and A.~Bánáti, ``Attack graph implementation in
graph database,'' in {\em 2022 IEEE 20th Jubilee International Symposium on
Intelligent Systems and Informatics (SISY)}, pp.~000127--000132, 2022.
\bibitem{Graph-DB}
B.~Yuan, Z.~Pan, F.~Shi, and Z.~Li, ``An attack path generation methods based
on graph database,'' in {\em 2020 IEEE 4th Information Technology,
Networking, Electronic and Automation Control Conference (ITNEC)}, vol.~1,
pp.~1905--1910, 2020.
\bibitem{LAPA}
F.~Yi, H.~Y. Cai, and F.~Z. Xin, ``A logic-based attack graph for analyzing
network security risk against potential attack,'' in {\em 2018 IEEE
International Conference on Networking, Architecture and Storage (NAS)},
pp.~1--4, 2018.
\bibitem{cook_scalable_2016}
K.~Cook, T.~Shaw, J.~Hale, and P.~Hawrylak, ``Scalable attack graph
generation,'' {\em Proceedings of the 11th Annual Cyber and Information
@ -68,6 +85,17 @@ M.~Li, P.~Hawrylak, and J.~Hale, ``Concurrency {Strategies} for {Attack}
{Graph} {Generation},'' {\em Proceedings - 2019 2nd International Conference
on Data Intelligence and Security, ICDIS 2019}, pp.~174--179, 2019.
\bibitem{AG-Sample}
O.~Subasi, S.~Purohit, A.~Bhattacharya, and S.~Chatterjee, ``Impact-driven
sampling strategies for hybrid attack graphs,'' in {\em 2022 IEEE
International Symposium on Technologies for Homeland Security (HST)},
pp.~1--7, 2022.
\bibitem{7087377}
K.~Kaynar and F.~Sivrikaya, ``Distributed attack graph generation,'' {\em IEEE
Transactions on Dependable and Secure Computing}, vol.~13, no.~5,
pp.~519--532, 2016.
\bibitem{li_combining_2019}
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
heterogeneous computing on a cluster,'' {\em ACM International Conference

View File

@ -4,45 +4,45 @@ The top-level auxiliary file: Schrick-Noah_AG-CG-CR.aux
The style file: ieeetr.bst
Database file #1: Bibliography.bib
Warning--empty journal in BLCR
You've used 16 entries,
You've used 21 entries,
1876 wiz_defined-function locations,
564 strings with 6509 characters,
and the built_in function-call counts, 3570 in all, are:
= -- 330
> -- 158
596 strings with 7573 characters,
and the built_in function-call counts, 5310 in all, are:
= -- 495
> -- 216
< -- 0
+ -- 59
- -- 43
* -- 230
:= -- 528
add.period$ -- 19
call.type$ -- 16
change.case$ -- 14
+ -- 80
- -- 59
* -- 347
:= -- 749
add.period$ -- 23
call.type$ -- 21
change.case$ -- 20
chr.to.int$ -- 0
cite$ -- 17
duplicate$ -- 187
empty$ -- 364
format.name$ -- 43
if$ -- 865
cite$ -- 22
duplicate$ -- 286
empty$ -- 542
format.name$ -- 59
if$ -- 1310
int.to.chr$ -- 0
int.to.str$ -- 16
missing$ -- 14
newline$ -- 55
num.names$ -- 16
pop$ -- 75
int.to.str$ -- 21
missing$ -- 19
newline$ -- 69
num.names$ -- 21
pop$ -- 103
preamble$ -- 1
purify$ -- 0
quote$ -- 0
skip$ -- 100
skip$ -- 176
stack$ -- 0
substring$ -- 171
swap$ -- 57
substring$ -- 311
swap$ -- 101
text.length$ -- 0
text.prefix$ -- 0
top$ -- 0
type$ -- 0
warning$ -- 1
while$ -- 32
width$ -- 18
write$ -- 141
while$ -- 47
width$ -- 23
write$ -- 188
(There was 1 warning)

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 25 APR 2023 01:12
This is pdfTeX, Version 3.141592653-2.6-1.40.25 (TeX Live 2023/Arch Linux) (preloaded format=pdflatex 2023.4.3) 25 APR 2023 02:18
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
@ -503,73 +503,69 @@ ts/enc/dvips/base/8r.enc}
]
LaTeX Font Info: Trying to load font information for U+msa on input line 72.
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
)
LaTeX Font Info: Trying to load font information for U+msb on input line 72.
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
)
<./images/checkpoint.png, id=91, 755.82375pt x 402.50375pt>
<./images/checkpoint.png, id=96, 755.82375pt x 402.50375pt>
File: ./images/checkpoint.png Graphic file (type png)
<use ./images/checkpoint.png>
Package pdftex.def Info: ./images/checkpoint.png used on input line 83.
Package pdftex.def Info: ./images/checkpoint.png used on input line 79.
(pdftex.def) Requested size: 252.0pt x 134.19624pt.
Underfull \hbox (badness 3158) in paragraph at lines 89--94
Underfull \hbox (badness 3158) in paragraph at lines 85--90
\OT1/ptm/m/it/10 1) Memory Constraint Difficulties: [][][] \OT1/ptm/m/n/10 Whi
le the design
[]
LaTeX Font Info: Trying to load font information for U+msa on input line 100
.
(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
File: umsa.fd 2013/01/14 v3.01 AMS symbols A
)
LaTeX Font Info: Trying to load font information for U+msb on input line 100
.
Underfull \hbox (badness 10000) in paragraph at lines 102--108
(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
File: umsb.fd 2013/01/14 v3.01 AMS symbols B
)
Underfull \hbox (badness 10000) in paragraph at lines 98--104
\OT1/ptm/m/it/10 2) Implementation: [][][] \OT1/ptm/m/n/10 Rather than only a
static
[]
[2 <./images/checkpoint.png>]
Underfull \hbox (badness 4660) in paragraph at lines 124--129
Underfull \hbox (badness 4660) in paragraph at lines 120--125
\OT1/ptm/m/it/10 3) Portability: [][][] \OT1/ptm/m/n/10 The checkpointing proc
ess is greatly
[]
[3]
<./images/instance_time.png, id=116, 606.265pt x 341.275pt>
<./images/instance_time.png, id=123, 606.265pt x 341.275pt>
File: ./images/instance_time.png Graphic file (type png)
<use ./images/instance_time.png>
Package pdftex.def Info: ./images/instance_time.png used on input line 140.
Package pdftex.def Info: ./images/instance_time.png used on input line 136.
(pdftex.def) Requested size: 252.0pt x 141.8556pt.
<./images/frontier_checkpoint_time.png, id=118, 607.26875pt x 341.275pt>
<./images/frontier_checkpoint_time.png, id=125, 607.26875pt x 341.275pt>
File: ./images/frontier_checkpoint_time.png Graphic file (type png)
<use ./images/frontier_checkpoint_time.png>
Package pdftex.def Info: ./images/frontier_checkpoint_time.png used on input l
ine 149.
ine 145.
(pdftex.def) Requested size: 252.0pt x 141.61606pt.
<./images/frontier_restart_time.png, id=120, 606.265pt x 341.275pt>
<./images/frontier_restart_time.png, id=127, 606.265pt x 341.275pt>
File: ./images/frontier_restart_time.png Graphic file (type png)
<use ./images/frontier_restart_time.png>
Package pdftex.def Info: ./images/frontier_restart_time.png used on input line
158.
154.
(pdftex.def) Requested size: 252.0pt x 141.8556pt.
Underfull \hbox (badness 1622) in paragraph at lines 164--165
Underfull \hbox (badness 1622) in paragraph at lines 160--161
\OT1/ptm/m/n/10 function calls or snapshots that are required. The C/R
[]
Underfull \vbox (badness 1776) has occurred while \output is active []
Underfull \hbox (badness 2150) in paragraph at lines 166--167
Underfull \hbox (badness 2150) in paragraph at lines 162--163
\OT1/ptm/m/n/10 checkpoint times and sizes, as well as time taken to
[]
Underfull \hbox (badness 1565) in paragraph at lines 166--167
Underfull \hbox (badness 1565) in paragraph at lines 162--163
\OT1/ptm/m/n/10 settings to alter or enable, or communication strategies
[]
@ -609,24 +605,21 @@ Package rerunfilecheck Info: File `Schrick-Noah_AG-CG-CR.out' has not changed.
(rerunfilecheck) Checksum: CC85FF3DB94FE8393E2ED734D36908F3;1379.
)
Here is how much of TeX's memory you used:
12075 strings out of 476025
191404 string characters out of 5796533
12086 strings out of 476025
191517 string characters out of 5796533
1871388 words of memory out of 5000000
32330 multiletter control sequences out of 15000+600000
32336 multiletter control sequences out of 15000+600000
544489 words of font info for 89 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
75i,8n,76p,1314b,592s stack positions out of 5000i,500n,10000p,200000b,80000s
75i,8n,76p,1431b,588s stack positions out of 5000i,500n,10000p,200000b,80000s
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmmi10.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/font
s/type1/public/amsfonts/cm/cmr7.pfb></usr/share/texmf-dist/fonts/type1/public/a
msfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmb8a.pfb><
/usr/share/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/share/texmf-dist/
fonts/type1/urw/times/utmr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/u
tmri8a.pfb>
Output written on Schrick-Noah_AG-CG-CR.pdf (5 pages, 208554 bytes).
texmf-dist/fonts/type1/urw/times/utmb8a.pfb></usr/share/texmf-dist/fonts/type1/
urw/times/utmbi8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmr8a.pfb><
/usr/share/texmf-dist/fonts/type1/urw/times/utmri8a.pfb>
Output written on Schrick-Noah_AG-CG-CR.pdf (5 pages, 185791 bytes).
PDF statistics:
184 PDF objects out of 1000 (max. 8388607)
151 compressed objects within 2 object streams
37 named destinations out of 1000 (max. 500000)
179 PDF objects out of 1000 (max. 8388607)
152 compressed objects within 2 object streams
42 named destinations out of 1000 (max. 500000)
109 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

View File

@ -67,11 +67,7 @@ Due to the runtime requirements and scalability challenges imposed by graph gene
\section{Related Work} \label{sec:Rel-Works}
Numerous efforts have been presented for C/R techniques with various categories available. The authors of \cite{CR-Survey} and \cite{hursey2010coordinated} discuss three categories of C/R, which include application-level, user-level, and system-level. Each approach draws upon advantages that appeal toward different aspects of reliability. User-level checkpointing, though has greater simplicity, results in larger checkpoints. System-level requires compatibility with the operating system and any libraries used for the application. Application-level checkpointing requires additional work for the implementation, but resuls in smaller, faster C/R. The authors of \cite{SCR} present the SCR (Scalable Checkpoint/Restart) library, which has seen widespread adoption due to its minimal overhead. DMTCP (Distributed MultiThreaded Checkpointing) \cite{dmtcp} and BLCR (Berkely Lab Checkpoint/Restart) \cite{BLCR} are two other commonly-used C/R approaches.
Other investigations into attack and compliance graphs attempt to improve performance and scalability to mitigate state space explosion or lengthy runtimes, rather than focus on C/R. As a means of improving scalability of attack graphs themselves, the authors of \cite{ou_scalable_2006} present a new representation scheme. Traditional attack graphs encode the entire network at each state,
but the representation presented by the authors uses logical statements to represent a portion of the network at each node. This is called a logical attack graph. This approach led to the reduction of the generation process
to quadratic time and reduced the number of nodes in the resulting graph to $\mathcal{O}({n}^2)$. However, this approach does require more analysis for identifying attack vectors. Another approach
presented by the authors of \cite{cook_scalable_2016} represents a description of systems and their qualities and topologies as a state, with a queue of unexplored states. This work was continued by the
authors of \cite{li_concurrency_2019} by implementing a hash table among other features. Each of these works demonstrates an improvement in scalability through refining the desirable information output.
Other investigations into attack and compliance graphs attempt to improve performance and scalability to mitigate state space explosion or lengthy runtimes, rather than focus on C/R. These investigations include the works by the authors of \cite{GraphDB}, which implement attack graph methodologies using Neo4j for efficient storage techniques. This approach has seen other implementations, such as that shown by the authors of \cite{Graph-DB}. Other attack graph scalability studies involve the alteration of the representation schemes. The authors of \cite{ou_scalable_2006} make use of logical statements for logical attack graphs. This approach has seen continued investigations, and similar logic-based attack graphs can be seen in the work presented by the authors of \cite{LAPA}. These logical based attack graphs aim to improve scalability by minimizing the resulting information. Other representation schemes include those seen by the authors of \cite{cook_scalable_2016} and the authors of \cite{li_concurrency_2019}, which make use of qualities and topologies through graph states. Scalability improvements have also been examined through sampling, such as the approach presented by the authors of \cite{AG-Sample}. Parallelization techniques have been investigated for runtime improvement, and successful results have been seen in the work by the authors of \cite{7087377}.
\section{Methodology}
\subsection{Checkpointing}