Introduction to Attack Graphs
This commit is contained in:
parent
86639cfaf0
commit
010e4c8093
@ -1,18 +1,18 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}\protected@file@percent }
|
||||||
\newlabel{App:A}{{A}{18}}
|
\newlabel{App:A}{{A}{20}}
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}\protected@file@percent }
|
||||||
\newlabel{App:B}{{B}{19}}
|
\newlabel{App:B}{{B}{21}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}\protected@file@percent }
|
||||||
\@setckpt{Appendices}{
|
\@setckpt{Appendices}{
|
||||||
\setcounter{page}{20}
|
\setcounter{page}{22}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
\setcounter{enumiii}{0}
|
\setcounter{enumiii}{0}
|
||||||
\setcounter{enumiv}{7}
|
\setcounter{enumiv}{11}
|
||||||
\setcounter{footnote}{0}
|
\setcounter{footnote}{0}
|
||||||
\setcounter{mpfootnote}{0}
|
\setcounter{mpfootnote}{0}
|
||||||
\setcounter{part}{0}
|
\setcounter{part}{0}
|
||||||
|
|||||||
12
Chapter1.aux
12
Chapter1.aux
@ -1,10 +1,16 @@
|
|||||||
\relax
|
\relax
|
||||||
|
\citation{phillips_graph-based_1998}
|
||||||
|
\citation{schneier_modeling_1999}
|
||||||
|
\citation{ou_scalable_2006}
|
||||||
|
\citation{sheyner_automated_2002}
|
||||||
|
\citation{ou_scalable_2006}
|
||||||
|
\citation{zhang_boosting_2017}
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{2}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{2}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter1}{
|
\@setckpt{Chapter1}{
|
||||||
\setcounter{page}{2}
|
\setcounter{page}{3}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
14
Chapter1.tex
14
Chapter1.tex
@ -1,5 +1,19 @@
|
|||||||
\TUchapter{INTRODUCTION}
|
\TUchapter{INTRODUCTION}
|
||||||
\TUsection{Introduction to Attack Graphs}
|
\TUsection{Introduction to Attack Graphs}
|
||||||
|
Cybersecurity has been at the forefront of computing for decades, and vulnerability analysis modeling has been utilized to mitigate threats to aid in this effort. One such modeling approach
|
||||||
|
is to represent a system or a set of systems through graphical means, and encode information into the nodes and edges of the graph. Even as early as the late 1990s,
|
||||||
|
experts have composed various graphical models to map devices and vulnerabilities through attack trees, and this work can be seen through the works published by the authors of \cite{phillips_graph-based_1998}.
|
||||||
|
This work, and other attack tree discussions of this time such as that conducted by the author of \cite{schneier_modeling_1999}, would later be referred to as early versions of modern-day attack graphs
|
||||||
|
\cite{ou_scalable_2006}. By utilizing this graphical approach, cybersecurity postures can be measued at a system's current status, as well as hypothesize and examine other postures based on system changes
|
||||||
|
over time.
|
||||||
|
|
||||||
|
Attack Graphs are an appealing approach since they are often designed to be exhaustive: all system properties are represented at its intial state, all attack options are fully enumerated, all permutations are
|
||||||
|
examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process. The authors of \cite{sheyner_automated_2002} also
|
||||||
|
discuss the advantage of conciseness of attack graphs, where the final graph only incorporates states that an attacker can leverage; no superflous states are generated that can clutter analysis. Despite their
|
||||||
|
advantages, attack graphs do suffer from their exhaustiveness. As the authors of \cite{ou_scalable_2006} examine, even very small networks with only 10 hosts and 5 vulnerabilites yield graphs with 10 million
|
||||||
|
edges. When scaling attack graphs to analyze the modern, interconnected state of large networks comprising of a multitude of hosts, and utilizing the entries located in the National Vulnerability Database and any
|
||||||
|
custom vulnerability testing, this becomes infeasible. Similar difficulties arise in related fields, where social networks, bio-informatics, and neural network representations also result in graphs with millions of
|
||||||
|
states \cite{zhang_boosting_2017}. Various efforts that will be discussed in Section \ref{sec:related_works} demonstrate methods and techniques that can mitigate these difficulties and improve performance.
|
||||||
|
|
||||||
\TUsection{Application to Cybersecurity and Compliance}
|
\TUsection{Application to Cybersecurity and Compliance}
|
||||||
|
|
||||||
|
|||||||
13
Chapter2.aux
13
Chapter2.aux
@ -1,11 +1,12 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{3}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{3}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}\protected@file@percent }
|
\newlabel{sec:related_works}{{2.2}{3}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{3}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{3}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter2}{
|
\@setckpt{Chapter2}{
|
||||||
\setcounter{page}{3}
|
\setcounter{page}{4}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
\TUsection{Introduction to Graph Generation}
|
\TUsection{Introduction to Graph Generation}
|
||||||
|
|
||||||
\TUsection{Improvements to Attack Graph Generation}
|
\TUsection{Improvements to Attack Graph Generation} \label{sec:related_works}
|
||||||
|
|
||||||
\TUsection{Attack Dependency Graphs}
|
\TUsection{Attack Dependency Graphs}
|
||||||
|
|
||||||
|
|||||||
30
Chapter3.aux
30
Chapter3.aux
@ -1,12 +1,12 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{4}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{4}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{3}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}\protected@file@percent }
|
||||||
\newlabel{sec:compops}{{3.2}{3}}
|
\newlabel{sec:compops}{{3.2}{4}}
|
||||||
\citation{cook_rage_2018}
|
\citation{cook_rage_2018}
|
||||||
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}\protected@file@percent }
|
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}\protected@file@percent }
|
||||||
\newlabel{fig:PW}{{3.1}{4}}
|
\newlabel{fig:PW}{{3.1}{5}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{6}{}\protected@file@percent }
|
||||||
\citation{cook_rage_2018}
|
\citation{cook_rage_2018}
|
||||||
\citation{li_concurrency_2019}
|
\citation{li_concurrency_2019}
|
||||||
\citation{li_combining_2019}
|
\citation{li_combining_2019}
|
||||||
@ -14,17 +14,17 @@
|
|||||||
\citation{ainsworth_graph_2016}
|
\citation{ainsworth_graph_2016}
|
||||||
\citation{berry_graph_2007}
|
\citation{berry_graph_2007}
|
||||||
\citation{cook_rage_2018}
|
\citation{cook_rage_2018}
|
||||||
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}\protected@file@percent }
|
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}\protected@file@percent }
|
||||||
\newlabel{fig:CC}{{3.2}{6}}
|
\newlabel{fig:CC}{{3.2}{7}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{6}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}\protected@file@percent }
|
||||||
\citation{zhang_boosting_2017}
|
\citation{zhang_boosting_2017}
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{8}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{9}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{10}{}\protected@file@percent }
|
||||||
\citation{CVE-2019-10747}
|
\citation{CVE-2019-10747}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{11}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter3}{
|
\@setckpt{Chapter3}{
|
||||||
\setcounter{page}{11}
|
\setcounter{page}{12}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
16
Chapter4.aux
16
Chapter4.aux
@ -1,13 +1,13 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter4}{
|
\@setckpt{Chapter4}{
|
||||||
\setcounter{page}{12}
|
\setcounter{page}{13}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
48
Chapter5.aux
48
Chapter5.aux
@ -1,30 +1,30 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{12}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{12}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task One}{12}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{12}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{12}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{12}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task One}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{13}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{13}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter5}{
|
\@setckpt{Chapter5}{
|
||||||
\setcounter{page}{14}
|
\setcounter{page}{15}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
36
Chapter6.aux
36
Chapter6.aux
@ -1,23 +1,23 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter6}{
|
\@setckpt{Chapter6}{
|
||||||
\setcounter{page}{16}
|
\setcounter{page}{17}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
@ -1,8 +1,8 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter7}{
|
\@setckpt{Chapter7}{
|
||||||
\setcounter{page}{17}
|
\setcounter{page}{18}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{0}
|
\setcounter{enumi}{0}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
@ -27,12 +27,16 @@
|
|||||||
\bibcite{CVE-2019-10747}{4}
|
\bibcite{CVE-2019-10747}{4}
|
||||||
\bibcite{li_combining_2019}{5}
|
\bibcite{li_combining_2019}{5}
|
||||||
\bibcite{li_concurrency_2019}{6}
|
\bibcite{li_concurrency_2019}{6}
|
||||||
\bibcite{zhang_boosting_2017}{7}
|
\bibcite{ou_scalable_2006}{7}
|
||||||
\bibstyle{plain}
|
\bibcite{phillips_graph-based_1998}{8}
|
||||||
|
\bibcite{schneier_modeling_1999}{9}
|
||||||
\@writefile{toc}{{\hfill \ }}
|
\@writefile{toc}{{\hfill \ }}
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\addvspace {10pt}}
|
\@writefile{toc}{\addvspace {10pt}}
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{{\hfill \ }}
|
\@writefile{toc}{{\hfill \ }}
|
||||||
|
\bibcite{sheyner_automated_2002}{10}
|
||||||
|
\bibcite{zhang_boosting_2017}{11}
|
||||||
|
\bibstyle{plain}
|
||||||
\@input{Appendices.aux}
|
\@input{Appendices.aux}
|
||||||
\gdef \@abspage@last{29}
|
\gdef \@abspage@last{31}
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
\begin{thebibliography}{1}
|
\begin{thebibliography}{10}
|
||||||
|
|
||||||
\bibitem{ainsworth_graph_2016}
|
\bibitem{ainsworth_graph_2016}
|
||||||
Sam Ainsworth and Timothy~M. Jones.
|
Sam Ainsworth and Timothy~M. Jones.
|
||||||
@ -35,6 +35,28 @@ Ming Li, Peter Hawrylak, and John Hale.
|
|||||||
\newblock {\em Proceedings - 2019 2nd International Conference on Data
|
\newblock {\em Proceedings - 2019 2nd International Conference on Data
|
||||||
Intelligence and Security, ICDIS 2019}, pages 174--179, 2019.
|
Intelligence and Security, ICDIS 2019}, pages 174--179, 2019.
|
||||||
|
|
||||||
|
\bibitem{ou_scalable_2006}
|
||||||
|
Xinming Ou, Wayne~F Boyer, and Miles~A Mcqueen.
|
||||||
|
\newblock A {Scalable} {Approach} to {Attack} {Graph} {Generation}.
|
||||||
|
\newblock pages 336--345, 2006.
|
||||||
|
|
||||||
|
\bibitem{phillips_graph-based_1998}
|
||||||
|
Cynthia Phillips and Laura~Painton Swiler.
|
||||||
|
\newblock A graph-based system for network-vulnerability analysis.
|
||||||
|
\newblock {\em Proceedings New Security Paradigms Workshop}, Part F1292:71--79,
|
||||||
|
1998.
|
||||||
|
|
||||||
|
\bibitem{schneier_modeling_1999}
|
||||||
|
Bruce Schneier.
|
||||||
|
\newblock Modeling {Security} {Threats}, 1999.
|
||||||
|
\newblock Publication Title: Dr. Dobb's Journal.
|
||||||
|
|
||||||
|
\bibitem{sheyner_automated_2002}
|
||||||
|
O.~Sheyner, J.~Haines, S.~Jha, R.. Lippmann, and J.~Wing.
|
||||||
|
\newblock Automated {Generation} and {Analysis} of {Attack} {Graphs}.
|
||||||
|
\newblock {\em Proceeding of 2002 IEEE Symposium on Security and Privacy},
|
||||||
|
pages 254--265, 2002.
|
||||||
|
|
||||||
\bibitem{zhang_boosting_2017}
|
\bibitem{zhang_boosting_2017}
|
||||||
Jialiang Zhang, Soroosh Khoram, and Jing Li.
|
Jialiang Zhang, Soroosh Khoram, and Jing Li.
|
||||||
\newblock Boosting the performance of {FPGA}-based graph processor using hybrid
|
\newblock Boosting the performance of {FPGA}-based graph processor using hybrid
|
||||||
|
|||||||
@ -12,45 +12,46 @@ The style file: plain.bst
|
|||||||
A level-1 auxiliary file: Appendices.aux
|
A level-1 auxiliary file: Appendices.aux
|
||||||
Database file #1: Bibliography.bib
|
Database file #1: Bibliography.bib
|
||||||
Warning--empty school in cook_rage_2018
|
Warning--empty school in cook_rage_2018
|
||||||
You've used 7 entries,
|
Warning--empty journal in ou_scalable_2006
|
||||||
|
You've used 11 entries,
|
||||||
2118 wiz_defined-function locations,
|
2118 wiz_defined-function locations,
|
||||||
540 strings with 5497 characters,
|
563 strings with 6143 characters,
|
||||||
and the built_in function-call counts, 2047 in all, are:
|
and the built_in function-call counts, 3540 in all, are:
|
||||||
= -- 206
|
= -- 359
|
||||||
> -- 88
|
> -- 154
|
||||||
< -- 2
|
< -- 4
|
||||||
+ -- 35
|
+ -- 63
|
||||||
- -- 28
|
- -- 50
|
||||||
* -- 118
|
* -- 209
|
||||||
:= -- 342
|
:= -- 576
|
||||||
add.period$ -- 20
|
add.period$ -- 32
|
||||||
call.type$ -- 7
|
call.type$ -- 11
|
||||||
change.case$ -- 35
|
change.case$ -- 58
|
||||||
chr.to.int$ -- 0
|
chr.to.int$ -- 0
|
||||||
cite$ -- 8
|
cite$ -- 13
|
||||||
duplicate$ -- 86
|
duplicate$ -- 144
|
||||||
empty$ -- 153
|
empty$ -- 263
|
||||||
format.name$ -- 28
|
format.name$ -- 50
|
||||||
if$ -- 433
|
if$ -- 754
|
||||||
int.to.chr$ -- 0
|
int.to.chr$ -- 0
|
||||||
int.to.str$ -- 7
|
int.to.str$ -- 11
|
||||||
missing$ -- 5
|
missing$ -- 8
|
||||||
newline$ -- 37
|
newline$ -- 57
|
||||||
num.names$ -- 12
|
num.names$ -- 20
|
||||||
pop$ -- 37
|
pop$ -- 65
|
||||||
preamble$ -- 1
|
preamble$ -- 1
|
||||||
purify$ -- 29
|
purify$ -- 48
|
||||||
quote$ -- 0
|
quote$ -- 0
|
||||||
skip$ -- 76
|
skip$ -- 128
|
||||||
stack$ -- 0
|
stack$ -- 0
|
||||||
substring$ -- 99
|
substring$ -- 204
|
||||||
swap$ -- 25
|
swap$ -- 46
|
||||||
text.length$ -- 2
|
text.length$ -- 4
|
||||||
text.prefix$ -- 0
|
text.prefix$ -- 0
|
||||||
top$ -- 0
|
top$ -- 0
|
||||||
type$ -- 28
|
type$ -- 44
|
||||||
warning$ -- 1
|
warning$ -- 2
|
||||||
while$ -- 18
|
while$ -- 34
|
||||||
width$ -- 8
|
width$ -- 13
|
||||||
write$ -- 73
|
write$ -- 115
|
||||||
(There was 1 warning)
|
(There were 2 warnings)
|
||||||
|
|||||||
@ -1,3 +1,3 @@
|
|||||||
{\vspace {\baselineskip }}
|
{\vspace {\baselineskip }}
|
||||||
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}%
|
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}%
|
||||||
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}%
|
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}%
|
||||||
|
|||||||
@ -1,4 +1,4 @@
|
|||||||
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 17:30
|
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 22:40
|
||||||
entering extended mode
|
entering extended mode
|
||||||
restricted \write18 enabled.
|
restricted \write18 enabled.
|
||||||
%&-line parsing enabled.
|
%&-line parsing enabled.
|
||||||
@ -198,16 +198,16 @@ Overfull \hbox (1.75291pt too wide) in paragraph at lines 22--22
|
|||||||
|
|
||||||
(./Chapter1.tex
|
(./Chapter1.tex
|
||||||
CHAPTER 1.
|
CHAPTER 1.
|
||||||
) [1
|
[1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
]
|
]) [2]
|
||||||
\openout2 = `Chapter2.aux'.
|
\openout2 = `Chapter2.aux'.
|
||||||
|
|
||||||
(./Chapter2.tex
|
(./Chapter2.tex
|
||||||
CHAPTER 2.
|
CHAPTER 2.
|
||||||
) [2
|
) [3
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -217,29 +217,29 @@ CHAPTER 2.
|
|||||||
|
|
||||||
(./Chapter3.tex
|
(./Chapter3.tex
|
||||||
CHAPTER 3.
|
CHAPTER 3.
|
||||||
<./Chapter3_img/PW.png, id=44, 958.58125pt x 525.965pt>
|
<./Chapter3_img/PW.png, id=48, 958.58125pt x 525.965pt>
|
||||||
File: ./Chapter3_img/PW.png Graphic file (type png)
|
File: ./Chapter3_img/PW.png Graphic file (type png)
|
||||||
<use ./Chapter3_img/PW.png>
|
<use ./Chapter3_img/PW.png>
|
||||||
Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17.
|
Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17.
|
||||||
(pdftex.def) Requested size: 469.75499pt x 257.74918pt.
|
(pdftex.def) Requested size: 469.75499pt x 257.74918pt.
|
||||||
[3
|
[4
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
] [4 <./Chapter3_img/PW.png>]
|
] [5 <./Chapter3_img/PW.png>]
|
||||||
<./Chapter3_img/CC.png, id=54, 658.46pt x 527.9725pt>
|
<./Chapter3_img/CC.png, id=57, 658.46pt x 527.9725pt>
|
||||||
File: ./Chapter3_img/CC.png Graphic file (type png)
|
File: ./Chapter3_img/CC.png Graphic file (type png)
|
||||||
<use ./Chapter3_img/CC.png>
|
<use ./Chapter3_img/CC.png>
|
||||||
Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55.
|
Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55.
|
||||||
(pdftex.def) Requested size: 469.75499pt x 376.66768pt.
|
(pdftex.def) Requested size: 469.75499pt x 376.66768pt.
|
||||||
[5] [6 <./Chapter3_img/CC.png>] [7] [8]
|
[6] [7 <./Chapter3_img/CC.png>] [8] [9]
|
||||||
[9]) [10]
|
[10]) [11]
|
||||||
\openout2 = `Chapter4.aux'.
|
\openout2 = `Chapter4.aux'.
|
||||||
|
|
||||||
(./Chapter4.tex
|
(./Chapter4.tex
|
||||||
CHAPTER 4.
|
CHAPTER 4.
|
||||||
) [11
|
) [12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -249,46 +249,46 @@ CHAPTER 4.
|
|||||||
|
|
||||||
(./Chapter5.tex
|
(./Chapter5.tex
|
||||||
CHAPTER 5.
|
CHAPTER 5.
|
||||||
[12
|
[13
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
]) [13]
|
]) [14]
|
||||||
\openout2 = `Chapter6.aux'.
|
\openout2 = `Chapter6.aux'.
|
||||||
|
|
||||||
(./Chapter6.tex
|
(./Chapter6.tex
|
||||||
CHAPTER 6.
|
CHAPTER 6.
|
||||||
[14
|
[15
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
]) [15]
|
]) [16]
|
||||||
\openout2 = `Chapter7.aux'.
|
\openout2 = `Chapter7.aux'.
|
||||||
|
|
||||||
(./Chapter7.tex
|
(./Chapter7.tex
|
||||||
CHAPTER 7.
|
CHAPTER 7.
|
||||||
) [16
|
) [17
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
] (./Schrick-Noah_MS-Thesis.bbl)
|
] (./Schrick-Noah_MS-Thesis.bbl [18
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
])
|
||||||
\c@appendixno=\count269
|
\c@appendixno=\count269
|
||||||
[17
|
[19]
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
]
|
|
||||||
\openout2 = `Appendices.aux'.
|
\openout2 = `Appendices.aux'.
|
||||||
|
|
||||||
(./Appendices.tex [18
|
(./Appendices.tex [20
|
||||||
|
|
||||||
]) [19]
|
])
|
||||||
(./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux
|
[21] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
|
||||||
) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux)
|
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
|
||||||
(./Appendices.aux)) )
|
(./Chapter7.aux) (./Appendices.aux)) )
|
||||||
(\end occurred inside a group at level 6)
|
(\end occurred inside a group at level 6)
|
||||||
|
|
||||||
### semi simple group (level 6) entered at line 198 (\begingroup)
|
### semi simple group (level 6) entered at line 198 (\begingroup)
|
||||||
@ -299,23 +299,23 @@ CHAPTER 7.
|
|||||||
### semi simple group (level 1) entered at line 52 (\begingroup)
|
### semi simple group (level 1) entered at line 52 (\begingroup)
|
||||||
### bottom level
|
### bottom level
|
||||||
Here is how much of TeX's memory you used:
|
Here is how much of TeX's memory you used:
|
||||||
2123 strings out of 478353
|
2128 strings out of 478353
|
||||||
37223 string characters out of 5854635
|
37335 string characters out of 5854635
|
||||||
344878 words of memory out of 5000000
|
344903 words of memory out of 5000000
|
||||||
20196 multiletter control sequences out of 15000+600000
|
20201 multiletter control sequences out of 15000+600000
|
||||||
407157 words of font info for 39 fonts, out of 8000000 for 9000
|
407157 words of font info for 39 fonts, out of 8000000 for 9000
|
||||||
1141 hyphenation exceptions out of 8191
|
1141 hyphenation exceptions out of 8191
|
||||||
55i,7n,62p,310b,1268s stack positions out of 5000i,500n,10000p,200000b,80000s
|
55i,7n,62p,310b,1301s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
|
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
|
||||||
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
|
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
|
||||||
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
|
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
|
||||||
ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
|
ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
|
||||||
/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
|
/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
|
||||||
mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
|
mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
|
||||||
Output written on Schrick-Noah_MS-Thesis.pdf (29 pages, 202909 bytes).
|
Output written on Schrick-Noah_MS-Thesis.pdf (31 pages, 206429 bytes).
|
||||||
PDF statistics:
|
PDF statistics:
|
||||||
130 PDF objects out of 1000 (max. 8388607)
|
137 PDF objects out of 1000 (max. 8388607)
|
||||||
84 compressed objects within 1 object stream
|
89 compressed objects within 1 object stream
|
||||||
0 named destinations out of 1000 (max. 500000)
|
0 named destinations out of 1000 (max. 500000)
|
||||||
11 words of extra memory for PDF output out of 10000 (max. 10000000)
|
11 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||||
|
|
||||||
|
|||||||
Binary file not shown.
@ -12,79 +12,79 @@
|
|||||||
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}%
|
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}%
|
||||||
\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}%
|
\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}%
|
||||||
\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}%
|
\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{2}{}%
|
||||||
\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}%
|
\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{2}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}%
|
||||||
\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}%
|
\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{3}{}%
|
||||||
\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}%
|
\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{3}{}%
|
||||||
\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}%
|
\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{3}{}%
|
||||||
\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}%
|
\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{3}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{4}{}%
|
||||||
\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}%
|
\contentsline {section}{\numberline {3.1}\bf Path Walking}{4}{}%
|
||||||
\contentsline {section}{\numberline {3.2}\bf Compound Operators}{3}{}%
|
\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}%
|
||||||
\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}%
|
\contentsline {section}{\numberline {3.3}\bf Color Coding}{6}{}%
|
||||||
\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{6}{}%
|
\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}%
|
||||||
\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}%
|
\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{8}{}%
|
||||||
\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}%
|
\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{9}{}%
|
||||||
\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}%
|
\contentsline {subsection}{\numberline {3.4.3}\it Portability}{10}{}%
|
||||||
\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}%
|
\contentsline {section}{\numberline {3.5}\bf Relational Operators}{11}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{12}{}%
|
||||||
\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}%
|
\contentsline {section}{\numberline {4.1}\bf Introduction}{12}{}%
|
||||||
\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}%
|
\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{12}{}%
|
||||||
\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}%
|
\contentsline {section}{\numberline {4.2}\bf Necessary Components}{12}{}%
|
||||||
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}%
|
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}%
|
||||||
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}%
|
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}%
|
||||||
\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}%
|
\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}%
|
||||||
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}%
|
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}%
|
||||||
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}%
|
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}%
|
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}%
|
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}%
|
||||||
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}%
|
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}%
|
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}%
|
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}%
|
||||||
\contentsline {subsubsection}{Communication Structure}{12}{}%
|
|
||||||
\contentsline {subsubsection}{Task Zero}{12}{}%
|
|
||||||
\contentsline {subsubsection}{Task One}{12}{}%
|
|
||||||
\contentsline {subsubsection}{Task Two}{12}{}%
|
|
||||||
\contentsline {subsubsection}{Task Three}{12}{}%
|
|
||||||
\contentsline {subsubsection}{Task Four}{12}{}%
|
|
||||||
\contentsline {subsubsection}{Task Five}{13}{}%
|
|
||||||
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}%
|
|
||||||
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}%
|
|
||||||
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}%
|
|
||||||
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Communication Structure}{13}{}%
|
\contentsline {subsubsection}{Communication Structure}{13}{}%
|
||||||
\contentsline {subsubsection}{Worker Nodes}{13}{}%
|
\contentsline {subsubsection}{Task Zero}{13}{}%
|
||||||
\contentsline {subsubsection}{Root Node}{13}{}%
|
\contentsline {subsubsection}{Task One}{13}{}%
|
||||||
\contentsline {subsubsection}{Database Node}{13}{}%
|
\contentsline {subsubsection}{Task Two}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}%
|
\contentsline {subsubsection}{Task Three}{13}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}%
|
\contentsline {subsubsection}{Task Four}{13}{}%
|
||||||
\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}%
|
\contentsline {subsubsection}{Task Five}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}%
|
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}%
|
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}%
|
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}%
|
||||||
\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}%
|
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}%
|
\contentsline {subsubsection}{Communication Structure}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}%
|
\contentsline {subsubsection}{Worker Nodes}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}%
|
\contentsline {subsubsection}{Root Node}{14}{}%
|
||||||
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}%
|
\contentsline {subsubsection}{Database Node}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}%
|
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}%
|
||||||
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}%
|
\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}%
|
||||||
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}%
|
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}%
|
||||||
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}%
|
\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}%
|
||||||
\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}%
|
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}%
|
||||||
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}%
|
\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}%
|
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}%
|
||||||
\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}%
|
\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}%
|
||||||
|
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}%
|
||||||
|
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}%
|
||||||
|
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}%
|
||||||
|
\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}%
|
||||||
{\hfill \ }
|
{\hfill \ }
|
||||||
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}%
|
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}%
|
||||||
\addvspace {10pt}
|
\addvspace {10pt}
|
||||||
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}%
|
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}%
|
||||||
{\hfill \ }
|
{\hfill \ }
|
||||||
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}%
|
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}%
|
||||||
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}%
|
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}%
|
||||||
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}%
|
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}%
|
||||||
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}%
|
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}%
|
||||||
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}%
|
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}%
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user