Introduction to Attack Graphs

This commit is contained in:
Noah L. Schrick 2022-02-25 22:40:12 -06:00
parent 86639cfaf0
commit 010e4c8093
17 changed files with 284 additions and 236 deletions

View File

@ -1,18 +1,18 @@
\relax \relax
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}\protected@file@percent }
\newlabel{App:A}{{A}{18}} \newlabel{App:A}{{A}{20}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}\protected@file@percent }
\newlabel{App:B}{{B}{19}} \newlabel{App:B}{{B}{21}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}\protected@file@percent }
\@setckpt{Appendices}{ \@setckpt{Appendices}{
\setcounter{page}{20} \setcounter{page}{22}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}
\setcounter{enumiii}{0} \setcounter{enumiii}{0}
\setcounter{enumiv}{7} \setcounter{enumiv}{11}
\setcounter{footnote}{0} \setcounter{footnote}{0}
\setcounter{mpfootnote}{0} \setcounter{mpfootnote}{0}
\setcounter{part}{0} \setcounter{part}{0}

View File

@ -1,10 +1,16 @@
\relax \relax
\citation{phillips_graph-based_1998}
\citation{schneier_modeling_1999}
\citation{ou_scalable_2006}
\citation{sheyner_automated_2002}
\citation{ou_scalable_2006}
\citation{zhang_boosting_2017}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{2}{}\protected@file@percent }
\@setckpt{Chapter1}{ \@setckpt{Chapter1}{
\setcounter{page}{2} \setcounter{page}{3}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,5 +1,19 @@
\TUchapter{INTRODUCTION} \TUchapter{INTRODUCTION}
\TUsection{Introduction to Attack Graphs} \TUsection{Introduction to Attack Graphs}
Cybersecurity has been at the forefront of computing for decades, and vulnerability analysis modeling has been utilized to mitigate threats to aid in this effort. One such modeling approach
is to represent a system or a set of systems through graphical means, and encode information into the nodes and edges of the graph. Even as early as the late 1990s,
experts have composed various graphical models to map devices and vulnerabilities through attack trees, and this work can be seen through the works published by the authors of \cite{phillips_graph-based_1998}.
This work, and other attack tree discussions of this time such as that conducted by the author of \cite{schneier_modeling_1999}, would later be referred to as early versions of modern-day attack graphs
\cite{ou_scalable_2006}. By utilizing this graphical approach, cybersecurity postures can be measued at a system's current status, as well as hypothesize and examine other postures based on system changes
over time.
Attack Graphs are an appealing approach since they are often designed to be exhaustive: all system properties are represented at its intial state, all attack options are fully enumerated, all permutations are
examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process. The authors of \cite{sheyner_automated_2002} also
discuss the advantage of conciseness of attack graphs, where the final graph only incorporates states that an attacker can leverage; no superflous states are generated that can clutter analysis. Despite their
advantages, attack graphs do suffer from their exhaustiveness. As the authors of \cite{ou_scalable_2006} examine, even very small networks with only 10 hosts and 5 vulnerabilites yield graphs with 10 million
edges. When scaling attack graphs to analyze the modern, interconnected state of large networks comprising of a multitude of hosts, and utilizing the entries located in the National Vulnerability Database and any
custom vulnerability testing, this becomes infeasible. Similar difficulties arise in related fields, where social networks, bio-informatics, and neural network representations also result in graphs with millions of
states \cite{zhang_boosting_2017}. Various efforts that will be discussed in Section \ref{sec:related_works} demonstrate methods and techniques that can mitigate these difficulties and improve performance.
\TUsection{Application to Cybersecurity and Compliance} \TUsection{Application to Cybersecurity and Compliance}

View File

@ -1,11 +1,12 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}\protected@file@percent } \newlabel{sec:related_works}{{2.2}{3}}
\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{3}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{3}{}\protected@file@percent }
\@setckpt{Chapter2}{ \@setckpt{Chapter2}{
\setcounter{page}{3} \setcounter{page}{4}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -2,7 +2,7 @@
\TUsection{Introduction to Graph Generation} \TUsection{Introduction to Graph Generation}
\TUsection{Improvements to Attack Graph Generation} \TUsection{Improvements to Attack Graph Generation} \label{sec:related_works}
\TUsection{Attack Dependency Graphs} \TUsection{Attack Dependency Graphs}

View File

@ -1,12 +1,12 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{3}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}\protected@file@percent }
\newlabel{sec:compops}{{3.2}{3}} \newlabel{sec:compops}{{3.2}{4}}
\citation{cook_rage_2018} \citation{cook_rage_2018}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}\protected@file@percent }
\newlabel{fig:PW}{{3.1}{4}} \newlabel{fig:PW}{{3.1}{5}}
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{6}{}\protected@file@percent }
\citation{cook_rage_2018} \citation{cook_rage_2018}
\citation{li_concurrency_2019} \citation{li_concurrency_2019}
\citation{li_combining_2019} \citation{li_combining_2019}
@ -14,17 +14,17 @@
\citation{ainsworth_graph_2016} \citation{ainsworth_graph_2016}
\citation{berry_graph_2007} \citation{berry_graph_2007}
\citation{cook_rage_2018} \citation{cook_rage_2018}
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}\protected@file@percent }
\newlabel{fig:CC}{{3.2}{6}} \newlabel{fig:CC}{{3.2}{7}}
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{6}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}\protected@file@percent }
\citation{zhang_boosting_2017} \citation{zhang_boosting_2017}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{8}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{9}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{10}{}\protected@file@percent }
\citation{CVE-2019-10747} \citation{CVE-2019-10747}
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{11}{}\protected@file@percent }
\@setckpt{Chapter3}{ \@setckpt{Chapter3}{
\setcounter{page}{11} \setcounter{page}{12}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,13 +1,13 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}\protected@file@percent }
\@setckpt{Chapter4}{ \@setckpt{Chapter4}{
\setcounter{page}{12} \setcounter{page}{13}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,30 +1,30 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task One}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{12}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task Zero}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task One}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task Two}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsubsection}{Task Three}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{13}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{14}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}\protected@file@percent }
\@setckpt{Chapter5}{ \@setckpt{Chapter5}{
\setcounter{page}{14} \setcounter{page}{15}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,23 +1,23 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}\protected@file@percent }
\@setckpt{Chapter6}{ \@setckpt{Chapter6}{
\setcounter{page}{16} \setcounter{page}{17}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -1,8 +1,8 @@
\relax \relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}\protected@file@percent }
\@setckpt{Chapter7}{ \@setckpt{Chapter7}{
\setcounter{page}{17} \setcounter{page}{18}
\setcounter{equation}{0} \setcounter{equation}{0}
\setcounter{enumi}{0} \setcounter{enumi}{0}
\setcounter{enumii}{0} \setcounter{enumii}{0}

View File

@ -27,12 +27,16 @@
\bibcite{CVE-2019-10747}{4} \bibcite{CVE-2019-10747}{4}
\bibcite{li_combining_2019}{5} \bibcite{li_combining_2019}{5}
\bibcite{li_concurrency_2019}{6} \bibcite{li_concurrency_2019}{6}
\bibcite{zhang_boosting_2017}{7} \bibcite{ou_scalable_2006}{7}
\bibstyle{plain} \bibcite{phillips_graph-based_1998}{8}
\bibcite{schneier_modeling_1999}{9}
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}\protected@file@percent }
\@writefile{toc}{\addvspace {10pt}} \@writefile{toc}{\addvspace {10pt}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }} \@writefile{toc}{{\hfill \ }}
\bibcite{sheyner_automated_2002}{10}
\bibcite{zhang_boosting_2017}{11}
\bibstyle{plain}
\@input{Appendices.aux} \@input{Appendices.aux}
\gdef \@abspage@last{29} \gdef \@abspage@last{31}

View File

@ -1,4 +1,4 @@
\begin{thebibliography}{1} \begin{thebibliography}{10}
\bibitem{ainsworth_graph_2016} \bibitem{ainsworth_graph_2016}
Sam Ainsworth and Timothy~M. Jones. Sam Ainsworth and Timothy~M. Jones.
@ -35,6 +35,28 @@ Ming Li, Peter Hawrylak, and John Hale.
\newblock {\em Proceedings - 2019 2nd International Conference on Data \newblock {\em Proceedings - 2019 2nd International Conference on Data
Intelligence and Security, ICDIS 2019}, pages 174--179, 2019. Intelligence and Security, ICDIS 2019}, pages 174--179, 2019.
\bibitem{ou_scalable_2006}
Xinming Ou, Wayne~F Boyer, and Miles~A Mcqueen.
\newblock A {Scalable} {Approach} to {Attack} {Graph} {Generation}.
\newblock pages 336--345, 2006.
\bibitem{phillips_graph-based_1998}
Cynthia Phillips and Laura~Painton Swiler.
\newblock A graph-based system for network-vulnerability analysis.
\newblock {\em Proceedings New Security Paradigms Workshop}, Part F1292:71--79,
1998.
\bibitem{schneier_modeling_1999}
Bruce Schneier.
\newblock Modeling {Security} {Threats}, 1999.
\newblock Publication Title: Dr. Dobb's Journal.
\bibitem{sheyner_automated_2002}
O.~Sheyner, J.~Haines, S.~Jha, R.. Lippmann, and J.~Wing.
\newblock Automated {Generation} and {Analysis} of {Attack} {Graphs}.
\newblock {\em Proceeding of 2002 IEEE Symposium on Security and Privacy},
pages 254--265, 2002.
\bibitem{zhang_boosting_2017} \bibitem{zhang_boosting_2017}
Jialiang Zhang, Soroosh Khoram, and Jing Li. Jialiang Zhang, Soroosh Khoram, and Jing Li.
\newblock Boosting the performance of {FPGA}-based graph processor using hybrid \newblock Boosting the performance of {FPGA}-based graph processor using hybrid

View File

@ -12,45 +12,46 @@ The style file: plain.bst
A level-1 auxiliary file: Appendices.aux A level-1 auxiliary file: Appendices.aux
Database file #1: Bibliography.bib Database file #1: Bibliography.bib
Warning--empty school in cook_rage_2018 Warning--empty school in cook_rage_2018
You've used 7 entries, Warning--empty journal in ou_scalable_2006
You've used 11 entries,
2118 wiz_defined-function locations, 2118 wiz_defined-function locations,
540 strings with 5497 characters, 563 strings with 6143 characters,
and the built_in function-call counts, 2047 in all, are: and the built_in function-call counts, 3540 in all, are:
= -- 206 = -- 359
> -- 88 > -- 154
< -- 2 < -- 4
+ -- 35 + -- 63
- -- 28 - -- 50
* -- 118 * -- 209
:= -- 342 := -- 576
add.period$ -- 20 add.period$ -- 32
call.type$ -- 7 call.type$ -- 11
change.case$ -- 35 change.case$ -- 58
chr.to.int$ -- 0 chr.to.int$ -- 0
cite$ -- 8 cite$ -- 13
duplicate$ -- 86 duplicate$ -- 144
empty$ -- 153 empty$ -- 263
format.name$ -- 28 format.name$ -- 50
if$ -- 433 if$ -- 754
int.to.chr$ -- 0 int.to.chr$ -- 0
int.to.str$ -- 7 int.to.str$ -- 11
missing$ -- 5 missing$ -- 8
newline$ -- 37 newline$ -- 57
num.names$ -- 12 num.names$ -- 20
pop$ -- 37 pop$ -- 65
preamble$ -- 1 preamble$ -- 1
purify$ -- 29 purify$ -- 48
quote$ -- 0 quote$ -- 0
skip$ -- 76 skip$ -- 128
stack$ -- 0 stack$ -- 0
substring$ -- 99 substring$ -- 204
swap$ -- 25 swap$ -- 46
text.length$ -- 2 text.length$ -- 4
text.prefix$ -- 0 text.prefix$ -- 0
top$ -- 0 top$ -- 0
type$ -- 28 type$ -- 44
warning$ -- 1 warning$ -- 2
while$ -- 18 while$ -- 34
width$ -- 8 width$ -- 13
write$ -- 73 write$ -- 115
(There was 1 warning) (There were 2 warnings)

View File

@ -1,3 +1,3 @@
{\vspace {\baselineskip }} {\vspace {\baselineskip }}
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}% \contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}%
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}% \contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}%

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 17:30 This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 22:40
entering extended mode entering extended mode
restricted \write18 enabled. restricted \write18 enabled.
%&-line parsing enabled. %&-line parsing enabled.
@ -198,16 +198,16 @@ Overfull \hbox (1.75291pt too wide) in paragraph at lines 22--22
(./Chapter1.tex (./Chapter1.tex
CHAPTER 1. CHAPTER 1.
) [1 [1
] ]) [2]
\openout2 = `Chapter2.aux'. \openout2 = `Chapter2.aux'.
(./Chapter2.tex (./Chapter2.tex
CHAPTER 2. CHAPTER 2.
) [2 ) [3
@ -217,29 +217,29 @@ CHAPTER 2.
(./Chapter3.tex (./Chapter3.tex
CHAPTER 3. CHAPTER 3.
<./Chapter3_img/PW.png, id=44, 958.58125pt x 525.965pt> <./Chapter3_img/PW.png, id=48, 958.58125pt x 525.965pt>
File: ./Chapter3_img/PW.png Graphic file (type png) File: ./Chapter3_img/PW.png Graphic file (type png)
<use ./Chapter3_img/PW.png> <use ./Chapter3_img/PW.png>
Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17. Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17.
(pdftex.def) Requested size: 469.75499pt x 257.74918pt. (pdftex.def) Requested size: 469.75499pt x 257.74918pt.
[3 [4
] [4 <./Chapter3_img/PW.png>] ] [5 <./Chapter3_img/PW.png>]
<./Chapter3_img/CC.png, id=54, 658.46pt x 527.9725pt> <./Chapter3_img/CC.png, id=57, 658.46pt x 527.9725pt>
File: ./Chapter3_img/CC.png Graphic file (type png) File: ./Chapter3_img/CC.png Graphic file (type png)
<use ./Chapter3_img/CC.png> <use ./Chapter3_img/CC.png>
Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55. Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55.
(pdftex.def) Requested size: 469.75499pt x 376.66768pt. (pdftex.def) Requested size: 469.75499pt x 376.66768pt.
[5] [6 <./Chapter3_img/CC.png>] [7] [8] [6] [7 <./Chapter3_img/CC.png>] [8] [9]
[9]) [10] [10]) [11]
\openout2 = `Chapter4.aux'. \openout2 = `Chapter4.aux'.
(./Chapter4.tex (./Chapter4.tex
CHAPTER 4. CHAPTER 4.
) [11 ) [12
@ -249,46 +249,46 @@ CHAPTER 4.
(./Chapter5.tex (./Chapter5.tex
CHAPTER 5. CHAPTER 5.
[12 [13
]) [13] ]) [14]
\openout2 = `Chapter6.aux'. \openout2 = `Chapter6.aux'.
(./Chapter6.tex (./Chapter6.tex
CHAPTER 6. CHAPTER 6.
[14 [15
]) [15] ]) [16]
\openout2 = `Chapter7.aux'. \openout2 = `Chapter7.aux'.
(./Chapter7.tex (./Chapter7.tex
CHAPTER 7. CHAPTER 7.
) [16 ) [17
] (./Schrick-Noah_MS-Thesis.bbl) ] (./Schrick-Noah_MS-Thesis.bbl [18
])
\c@appendixno=\count269 \c@appendixno=\count269
[17 [19]
]
\openout2 = `Appendices.aux'. \openout2 = `Appendices.aux'.
(./Appendices.tex [18 (./Appendices.tex [20
]) [19] ])
(./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux [21] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux) (./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
(./Appendices.aux)) ) (./Chapter7.aux) (./Appendices.aux)) )
(\end occurred inside a group at level 6) (\end occurred inside a group at level 6)
### semi simple group (level 6) entered at line 198 (\begingroup) ### semi simple group (level 6) entered at line 198 (\begingroup)
@ -299,23 +299,23 @@ CHAPTER 7.
### semi simple group (level 1) entered at line 52 (\begingroup) ### semi simple group (level 1) entered at line 52 (\begingroup)
### bottom level ### bottom level
Here is how much of TeX's memory you used: Here is how much of TeX's memory you used:
2123 strings out of 478353 2128 strings out of 478353
37223 string characters out of 5854635 37335 string characters out of 5854635
344878 words of memory out of 5000000 344903 words of memory out of 5000000
20196 multiletter control sequences out of 15000+600000 20201 multiletter control sequences out of 15000+600000
407157 words of font info for 39 fonts, out of 8000000 for 9000 407157 words of font info for 39 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191 1141 hyphenation exceptions out of 8191
55i,7n,62p,310b,1268s stack positions out of 5000i,500n,10000p,200000b,80000s 55i,7n,62p,310b,1301s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en {/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/ c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c /amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb> mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
Output written on Schrick-Noah_MS-Thesis.pdf (29 pages, 202909 bytes). Output written on Schrick-Noah_MS-Thesis.pdf (31 pages, 206429 bytes).
PDF statistics: PDF statistics:
130 PDF objects out of 1000 (max. 8388607) 137 PDF objects out of 1000 (max. 8388607)
84 compressed objects within 1 object stream 89 compressed objects within 1 object stream
0 named destinations out of 1000 (max. 500000) 0 named destinations out of 1000 (max. 500000)
11 words of extra memory for PDF output out of 10000 (max. 10000000) 11 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

View File

@ -12,79 +12,79 @@
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}% \contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}%
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}% \contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}%
\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}% \contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}%
\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}% \contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{2}{}%
\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}% \contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{2}{}%
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}% \contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}%
\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}% \contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{3}{}%
\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}% \contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{3}{}%
\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}% \contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{3}{}%
\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}% \contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{3}{}%
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}% \contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{4}{}%
\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}% \contentsline {section}{\numberline {3.1}\bf Path Walking}{4}{}%
\contentsline {section}{\numberline {3.2}\bf Compound Operators}{3}{}% \contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}%
\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}% \contentsline {section}{\numberline {3.3}\bf Color Coding}{6}{}%
\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{6}{}% \contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}%
\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}% \contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{8}{}%
\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}% \contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{9}{}%
\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}% \contentsline {subsection}{\numberline {3.4.3}\it Portability}{10}{}%
\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}% \contentsline {section}{\numberline {3.5}\bf Relational Operators}{11}{}%
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}% \contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{12}{}%
\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}% \contentsline {section}{\numberline {4.1}\bf Introduction}{12}{}%
\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}% \contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{12}{}%
\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}% \contentsline {section}{\numberline {4.2}\bf Necessary Components}{12}{}%
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}% \contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}%
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}% \contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}%
\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}% \contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}%
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}% \contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}%
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}% \contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}%
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}% \contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}%
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}% \contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}%
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}% \contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}%
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}% \contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}%
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}% \contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}%
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}% \contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}%
\contentsline {subsubsection}{Communication Structure}{12}{}%
\contentsline {subsubsection}{Task Zero}{12}{}%
\contentsline {subsubsection}{Task One}{12}{}%
\contentsline {subsubsection}{Task Two}{12}{}%
\contentsline {subsubsection}{Task Three}{12}{}%
\contentsline {subsubsection}{Task Four}{12}{}%
\contentsline {subsubsection}{Task Five}{13}{}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}%
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}%
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}%
\contentsline {subsubsection}{Communication Structure}{13}{}% \contentsline {subsubsection}{Communication Structure}{13}{}%
\contentsline {subsubsection}{Worker Nodes}{13}{}% \contentsline {subsubsection}{Task Zero}{13}{}%
\contentsline {subsubsection}{Root Node}{13}{}% \contentsline {subsubsection}{Task One}{13}{}%
\contentsline {subsubsection}{Database Node}{13}{}% \contentsline {subsubsection}{Task Two}{13}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}% \contentsline {subsubsection}{Task Three}{13}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}% \contentsline {subsubsection}{Task Four}{13}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}% \contentsline {subsubsection}{Task Five}{14}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}% \contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}% \contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}% \contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}% \contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}% \contentsline {subsubsection}{Communication Structure}{14}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}% \contentsline {subsubsection}{Worker Nodes}{14}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}% \contentsline {subsubsection}{Root Node}{14}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}% \contentsline {subsubsection}{Database Node}{14}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}% \contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}% \contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}% \contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}% \contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}% \contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}% \contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}% \contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}% \contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}% \contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}% \contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}%
\addvspace {10pt} \addvspace {10pt}
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}% \contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}%
{\hfill \ } {\hfill \ }
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}% \contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}% \contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}% \contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}%