diff --git a/Appendices.aux b/Appendices.aux index 2bfd601..9c2e85f 100644 --- a/Appendices.aux +++ b/Appendices.aux @@ -1,18 +1,18 @@ \relax -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}\protected@file@percent } -\newlabel{App:A}{{A}{18}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}\protected@file@percent } -\newlabel{App:B}{{B}{19}} -\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}\protected@file@percent } +\newlabel{App:A}{{A}{20}} +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}\protected@file@percent } +\newlabel{App:B}{{B}{21}} +\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}\protected@file@percent } \@setckpt{Appendices}{ -\setcounter{page}{20} +\setcounter{page}{22} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} -\setcounter{enumiv}{7} +\setcounter{enumiv}{11} \setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} diff --git a/Chapter1.aux b/Chapter1.aux index 86a6dd0..60c2c89 100644 --- a/Chapter1.aux +++ b/Chapter1.aux @@ -1,10 +1,16 @@ \relax +\citation{phillips_graph-based_1998} +\citation{schneier_modeling_1999} +\citation{ou_scalable_2006} +\citation{sheyner_automated_2002} +\citation{ou_scalable_2006} +\citation{zhang_boosting_2017} \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{2}{}\protected@file@percent } \@setckpt{Chapter1}{ -\setcounter{page}{2} +\setcounter{page}{3} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter1.tex b/Chapter1.tex index a5e3b7b..e2820f9 100644 --- a/Chapter1.tex +++ b/Chapter1.tex @@ -1,5 +1,19 @@ \TUchapter{INTRODUCTION} \TUsection{Introduction to Attack Graphs} +Cybersecurity has been at the forefront of computing for decades, and vulnerability analysis modeling has been utilized to mitigate threats to aid in this effort. One such modeling approach +is to represent a system or a set of systems through graphical means, and encode information into the nodes and edges of the graph. Even as early as the late 1990s, +experts have composed various graphical models to map devices and vulnerabilities through attack trees, and this work can be seen through the works published by the authors of \cite{phillips_graph-based_1998}. +This work, and other attack tree discussions of this time such as that conducted by the author of \cite{schneier_modeling_1999}, would later be referred to as early versions of modern-day attack graphs +\cite{ou_scalable_2006}. By utilizing this graphical approach, cybersecurity postures can be measued at a system's current status, as well as hypothesize and examine other postures based on system changes +over time. + +Attack Graphs are an appealing approach since they are often designed to be exhaustive: all system properties are represented at its intial state, all attack options are fully enumerated, all permutations are +examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process. The authors of \cite{sheyner_automated_2002} also +discuss the advantage of conciseness of attack graphs, where the final graph only incorporates states that an attacker can leverage; no superflous states are generated that can clutter analysis. Despite their +advantages, attack graphs do suffer from their exhaustiveness. As the authors of \cite{ou_scalable_2006} examine, even very small networks with only 10 hosts and 5 vulnerabilites yield graphs with 10 million +edges. When scaling attack graphs to analyze the modern, interconnected state of large networks comprising of a multitude of hosts, and utilizing the entries located in the National Vulnerability Database and any +custom vulnerability testing, this becomes infeasible. Similar difficulties arise in related fields, where social networks, bio-informatics, and neural network representations also result in graphs with millions of +states \cite{zhang_boosting_2017}. Various efforts that will be discussed in Section \ref{sec:related_works} demonstrate methods and techniques that can mitigate these difficulties and improve performance. \TUsection{Application to Cybersecurity and Compliance} diff --git a/Chapter2.aux b/Chapter2.aux index d43f7c8..22a02a8 100644 --- a/Chapter2.aux +++ b/Chapter2.aux @@ -1,11 +1,12 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{3}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{3}{}\protected@file@percent } +\newlabel{sec:related_works}{{2.2}{3}} +\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{3}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{3}{}\protected@file@percent } \@setckpt{Chapter2}{ -\setcounter{page}{3} +\setcounter{page}{4} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter2.tex b/Chapter2.tex index aab38da..4b1d1b2 100644 --- a/Chapter2.tex +++ b/Chapter2.tex @@ -2,7 +2,7 @@ \TUsection{Introduction to Graph Generation} -\TUsection{Improvements to Attack Graph Generation} +\TUsection{Improvements to Attack Graph Generation} \label{sec:related_works} \TUsection{Attack Dependency Graphs} diff --git a/Chapter3.aux b/Chapter3.aux index 22dacbd..06b42d6 100644 --- a/Chapter3.aux +++ b/Chapter3.aux @@ -1,12 +1,12 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{3}{}\protected@file@percent } -\newlabel{sec:compops}{{3.2}{3}} +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{4}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{4}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}\protected@file@percent } +\newlabel{sec:compops}{{3.2}{4}} \citation{cook_rage_2018} -\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}\protected@file@percent } -\newlabel{fig:PW}{{3.1}{4}} -\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}\protected@file@percent } +\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}\protected@file@percent } +\newlabel{fig:PW}{{3.1}{5}} +\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{6}{}\protected@file@percent } \citation{cook_rage_2018} \citation{li_concurrency_2019} \citation{li_combining_2019} @@ -14,17 +14,17 @@ \citation{ainsworth_graph_2016} \citation{berry_graph_2007} \citation{cook_rage_2018} -\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}\protected@file@percent } -\newlabel{fig:CC}{{3.2}{6}} -\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{6}{}\protected@file@percent } +\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}\protected@file@percent } +\newlabel{fig:CC}{{3.2}{7}} +\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}\protected@file@percent } \citation{zhang_boosting_2017} -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{8}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{9}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{10}{}\protected@file@percent } \citation{CVE-2019-10747} -\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{11}{}\protected@file@percent } \@setckpt{Chapter3}{ -\setcounter{page}{11} +\setcounter{page}{12} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter4.aux b/Chapter4.aux index 03d8c35..d7a0249 100644 --- a/Chapter4.aux +++ b/Chapter4.aux @@ -1,13 +1,13 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}\protected@file@percent } \@setckpt{Chapter4}{ -\setcounter{page}{12} +\setcounter{page}{13} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter5.aux b/Chapter5.aux index 0453a42..20440f8 100644 --- a/Chapter5.aux +++ b/Chapter5.aux @@ -1,30 +1,30 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task One}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Two}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Three}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Four}{12}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Five}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Root Node}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Database Node}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task One}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Two}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Three}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Four}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Five}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Root Node}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Database Node}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}\protected@file@percent } \@setckpt{Chapter5}{ -\setcounter{page}{14} +\setcounter{page}{15} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter6.aux b/Chapter6.aux index 6769394..c72a971 100644 --- a/Chapter6.aux +++ b/Chapter6.aux @@ -1,23 +1,23 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}\protected@file@percent } \@setckpt{Chapter6}{ -\setcounter{page}{16} +\setcounter{page}{17} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter7.aux b/Chapter7.aux index bc17ef6..c7e4162 100644 --- a/Chapter7.aux +++ b/Chapter7.aux @@ -1,8 +1,8 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}\protected@file@percent } \@setckpt{Chapter7}{ -\setcounter{page}{17} +\setcounter{page}{18} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Schrick-Noah_MS-Thesis.aux b/Schrick-Noah_MS-Thesis.aux index 1ed92ae..e142aeb 100644 --- a/Schrick-Noah_MS-Thesis.aux +++ b/Schrick-Noah_MS-Thesis.aux @@ -27,12 +27,16 @@ \bibcite{CVE-2019-10747}{4} \bibcite{li_combining_2019}{5} \bibcite{li_concurrency_2019}{6} -\bibcite{zhang_boosting_2017}{7} -\bibstyle{plain} +\bibcite{ou_scalable_2006}{7} +\bibcite{phillips_graph-based_1998}{8} +\bibcite{schneier_modeling_1999}{9} \@writefile{toc}{{\hfill \ }} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}\protected@file@percent } \@writefile{toc}{\addvspace {10pt}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} +\bibcite{sheyner_automated_2002}{10} +\bibcite{zhang_boosting_2017}{11} +\bibstyle{plain} \@input{Appendices.aux} -\gdef \@abspage@last{29} +\gdef \@abspage@last{31} diff --git a/Schrick-Noah_MS-Thesis.bbl b/Schrick-Noah_MS-Thesis.bbl index ab8202a..3c649b9 100644 --- a/Schrick-Noah_MS-Thesis.bbl +++ b/Schrick-Noah_MS-Thesis.bbl @@ -1,4 +1,4 @@ -\begin{thebibliography}{1} +\begin{thebibliography}{10} \bibitem{ainsworth_graph_2016} Sam Ainsworth and Timothy~M. Jones. @@ -35,6 +35,28 @@ Ming Li, Peter Hawrylak, and John Hale. \newblock {\em Proceedings - 2019 2nd International Conference on Data Intelligence and Security, ICDIS 2019}, pages 174--179, 2019. +\bibitem{ou_scalable_2006} +Xinming Ou, Wayne~F Boyer, and Miles~A Mcqueen. +\newblock A {Scalable} {Approach} to {Attack} {Graph} {Generation}. +\newblock pages 336--345, 2006. + +\bibitem{phillips_graph-based_1998} +Cynthia Phillips and Laura~Painton Swiler. +\newblock A graph-based system for network-vulnerability analysis. +\newblock {\em Proceedings New Security Paradigms Workshop}, Part F1292:71--79, + 1998. + +\bibitem{schneier_modeling_1999} +Bruce Schneier. +\newblock Modeling {Security} {Threats}, 1999. +\newblock Publication Title: Dr. Dobb's Journal. + +\bibitem{sheyner_automated_2002} +O.~Sheyner, J.~Haines, S.~Jha, R.. Lippmann, and J.~Wing. +\newblock Automated {Generation} and {Analysis} of {Attack} {Graphs}. +\newblock {\em Proceeding of 2002 IEEE Symposium on Security and Privacy}, + pages 254--265, 2002. + \bibitem{zhang_boosting_2017} Jialiang Zhang, Soroosh Khoram, and Jing Li. \newblock Boosting the performance of {FPGA}-based graph processor using hybrid diff --git a/Schrick-Noah_MS-Thesis.blg b/Schrick-Noah_MS-Thesis.blg index 3aa1185..f04e397 100644 --- a/Schrick-Noah_MS-Thesis.blg +++ b/Schrick-Noah_MS-Thesis.blg @@ -12,45 +12,46 @@ The style file: plain.bst A level-1 auxiliary file: Appendices.aux Database file #1: Bibliography.bib Warning--empty school in cook_rage_2018 -You've used 7 entries, +Warning--empty journal in ou_scalable_2006 +You've used 11 entries, 2118 wiz_defined-function locations, - 540 strings with 5497 characters, -and the built_in function-call counts, 2047 in all, are: -= -- 206 -> -- 88 -< -- 2 -+ -- 35 -- -- 28 -* -- 118 -:= -- 342 -add.period$ -- 20 -call.type$ -- 7 -change.case$ -- 35 + 563 strings with 6143 characters, +and the built_in function-call counts, 3540 in all, are: += -- 359 +> -- 154 +< -- 4 ++ -- 63 +- -- 50 +* -- 209 +:= -- 576 +add.period$ -- 32 +call.type$ -- 11 +change.case$ -- 58 chr.to.int$ -- 0 -cite$ -- 8 -duplicate$ -- 86 -empty$ -- 153 -format.name$ -- 28 -if$ -- 433 +cite$ -- 13 +duplicate$ -- 144 +empty$ -- 263 +format.name$ -- 50 +if$ -- 754 int.to.chr$ -- 0 -int.to.str$ -- 7 -missing$ -- 5 -newline$ -- 37 -num.names$ -- 12 -pop$ -- 37 +int.to.str$ -- 11 +missing$ -- 8 +newline$ -- 57 +num.names$ -- 20 +pop$ -- 65 preamble$ -- 1 -purify$ -- 29 +purify$ -- 48 quote$ -- 0 -skip$ -- 76 +skip$ -- 128 stack$ -- 0 -substring$ -- 99 -swap$ -- 25 -text.length$ -- 2 +substring$ -- 204 +swap$ -- 46 +text.length$ -- 4 text.prefix$ -- 0 top$ -- 0 -type$ -- 28 -warning$ -- 1 -while$ -- 18 -width$ -- 8 -write$ -- 73 -(There was 1 warning) +type$ -- 44 +warning$ -- 2 +while$ -- 34 +width$ -- 13 +write$ -- 115 +(There were 2 warnings) diff --git a/Schrick-Noah_MS-Thesis.lof b/Schrick-Noah_MS-Thesis.lof index 43c857f..e4156bb 100644 --- a/Schrick-Noah_MS-Thesis.lof +++ b/Schrick-Noah_MS-Thesis.lof @@ -1,3 +1,3 @@ {\vspace {\baselineskip }} -\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}% +\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}% diff --git a/Schrick-Noah_MS-Thesis.log b/Schrick-Noah_MS-Thesis.log index 4dd00fa..b4e5405 100644 --- a/Schrick-Noah_MS-Thesis.log +++ b/Schrick-Noah_MS-Thesis.log @@ -1,4 +1,4 @@ -This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 17:30 +This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 22:40 entering extended mode restricted \write18 enabled. %&-line parsing enabled. @@ -198,16 +198,16 @@ Overfull \hbox (1.75291pt too wide) in paragraph at lines 22--22 (./Chapter1.tex CHAPTER 1. -) [1 +[1 -] +]) [2] \openout2 = `Chapter2.aux'. (./Chapter2.tex CHAPTER 2. -) [2 +) [3 @@ -217,29 +217,29 @@ CHAPTER 2. (./Chapter3.tex CHAPTER 3. -<./Chapter3_img/PW.png, id=44, 958.58125pt x 525.965pt> +<./Chapter3_img/PW.png, id=48, 958.58125pt x 525.965pt> File: ./Chapter3_img/PW.png Graphic file (type png) Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17. (pdftex.def) Requested size: 469.75499pt x 257.74918pt. -[3 +[4 -] [4 <./Chapter3_img/PW.png>] -<./Chapter3_img/CC.png, id=54, 658.46pt x 527.9725pt> +] [5 <./Chapter3_img/PW.png>] +<./Chapter3_img/CC.png, id=57, 658.46pt x 527.9725pt> File: ./Chapter3_img/CC.png Graphic file (type png) Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55. (pdftex.def) Requested size: 469.75499pt x 376.66768pt. - [5] [6 <./Chapter3_img/CC.png>] [7] [8] -[9]) [10] + [6] [7 <./Chapter3_img/CC.png>] [8] [9] +[10]) [11] \openout2 = `Chapter4.aux'. (./Chapter4.tex CHAPTER 4. -) [11 +) [12 @@ -249,46 +249,46 @@ CHAPTER 4. (./Chapter5.tex CHAPTER 5. -[12 +[13 -]) [13] +]) [14] \openout2 = `Chapter6.aux'. (./Chapter6.tex CHAPTER 6. -[14 +[15 -]) [15] +]) [16] \openout2 = `Chapter7.aux'. (./Chapter7.tex CHAPTER 7. -) [16 +) [17 -] (./Schrick-Noah_MS-Thesis.bbl) +] (./Schrick-Noah_MS-Thesis.bbl [18 + + + +]) \c@appendixno=\count269 - [17 - - - -] + [19] \openout2 = `Appendices.aux'. - (./Appendices.tex [18 + (./Appendices.tex [20 -]) [19] -(./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux -) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux) -(./Appendices.aux)) ) +]) +[21] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) +(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) +(./Chapter7.aux) (./Appendices.aux)) ) (\end occurred inside a group at level 6) ### semi simple group (level 6) entered at line 198 (\begingroup) @@ -299,23 +299,23 @@ CHAPTER 7. ### semi simple group (level 1) entered at line 52 (\begingroup) ### bottom level Here is how much of TeX's memory you used: - 2123 strings out of 478353 - 37223 string characters out of 5854635 - 344878 words of memory out of 5000000 - 20196 multiletter control sequences out of 15000+600000 + 2128 strings out of 478353 + 37335 string characters out of 5854635 + 344903 words of memory out of 5000000 + 20201 multiletter control sequences out of 15000+600000 407157 words of font info for 39 fonts, out of 8000000 for 9000 1141 hyphenation exceptions out of 8191 - 55i,7n,62p,310b,1268s stack positions out of 5000i,500n,10000p,200000b,80000s + 55i,7n,62p,310b,1301s stack positions out of 5000i,500n,10000p,200000b,80000s {/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en c} -Output written on Schrick-Noah_MS-Thesis.pdf (29 pages, 202909 bytes). +Output written on Schrick-Noah_MS-Thesis.pdf (31 pages, 206429 bytes). PDF statistics: - 130 PDF objects out of 1000 (max. 8388607) - 84 compressed objects within 1 object stream + 137 PDF objects out of 1000 (max. 8388607) + 89 compressed objects within 1 object stream 0 named destinations out of 1000 (max. 500000) 11 words of extra memory for PDF output out of 10000 (max. 10000000) diff --git a/Schrick-Noah_MS-Thesis.pdf b/Schrick-Noah_MS-Thesis.pdf index c90e2b1..0b6c515 100644 Binary files a/Schrick-Noah_MS-Thesis.pdf and b/Schrick-Noah_MS-Thesis.pdf differ diff --git a/Schrick-Noah_MS-Thesis.toc b/Schrick-Noah_MS-Thesis.toc index 16068dd..56e2216 100644 --- a/Schrick-Noah_MS-Thesis.toc +++ b/Schrick-Noah_MS-Thesis.toc @@ -12,79 +12,79 @@ \contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}% \contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}% \contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}% -\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}% -\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}% -\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}% -\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}% -\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}% -\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}% -\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}% -\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}% -\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}% -\contentsline {section}{\numberline {3.2}\bf Compound Operators}{3}{}% -\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}% -\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{6}{}% -\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}% -\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}% -\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}% -\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}% -\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}% -\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}% -\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}% -\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}% -\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}% -\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}% -\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}% -\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}% -\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}% -\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}% -\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}% -\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}% -\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}% -\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}% -\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}% -\contentsline {subsubsection}{Communication Structure}{12}{}% -\contentsline {subsubsection}{Task Zero}{12}{}% -\contentsline {subsubsection}{Task One}{12}{}% -\contentsline {subsubsection}{Task Two}{12}{}% -\contentsline {subsubsection}{Task Three}{12}{}% -\contentsline {subsubsection}{Task Four}{12}{}% -\contentsline {subsubsection}{Task Five}{13}{}% -\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}% -\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}% -\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}% -\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}% +\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{2}{}% +\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{2}{}% +\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}% +\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{3}{}% +\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{3}{}% +\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{3}{}% +\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{3}{}% +\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{4}{}% +\contentsline {section}{\numberline {3.1}\bf Path Walking}{4}{}% +\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}% +\contentsline {section}{\numberline {3.3}\bf Color Coding}{6}{}% +\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}% +\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{8}{}% +\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{9}{}% +\contentsline {subsection}{\numberline {3.4.3}\it Portability}{10}{}% +\contentsline {section}{\numberline {3.5}\bf Relational Operators}{11}{}% +\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{12}{}% +\contentsline {section}{\numberline {4.1}\bf Introduction}{12}{}% +\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{12}{}% +\contentsline {section}{\numberline {4.2}\bf Necessary Components}{12}{}% +\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}% +\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}% +\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}% +\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}% +\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}% +\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}% +\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}% +\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}% +\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}% +\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}% +\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}% \contentsline {subsubsection}{Communication Structure}{13}{}% -\contentsline {subsubsection}{Worker Nodes}{13}{}% -\contentsline {subsubsection}{Root Node}{13}{}% -\contentsline {subsubsection}{Database Node}{13}{}% -\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}% -\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}% -\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}% -\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}% -\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}% -\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}% -\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}% -\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}% -\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}% -\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}% -\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}% -\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}% -\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}% -\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}% -\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}% -\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}% -\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}% -\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}% -\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}% -\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}% +\contentsline {subsubsection}{Task Zero}{13}{}% +\contentsline {subsubsection}{Task One}{13}{}% +\contentsline {subsubsection}{Task Two}{13}{}% +\contentsline {subsubsection}{Task Three}{13}{}% +\contentsline {subsubsection}{Task Four}{13}{}% +\contentsline {subsubsection}{Task Five}{14}{}% +\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}% +\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}% +\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}% +\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}% +\contentsline {subsubsection}{Communication Structure}{14}{}% +\contentsline {subsubsection}{Worker Nodes}{14}{}% +\contentsline {subsubsection}{Root Node}{14}{}% +\contentsline {subsubsection}{Database Node}{14}{}% +\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}% +\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}% +\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}% +\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}% +\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}% +\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}% +\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}% +\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}% +\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}% +\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}% +\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}% +\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}% +\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}% +\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}% +\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}% +\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}% +\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}% +\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}% +\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}% +\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}% +\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}% \addvspace {10pt} -\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}% +\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}% -\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}% -\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}% -\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}% -\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}% +\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}% +\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}% +\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}%