Bibliography ordering by appearance

This commit is contained in:
Noah L. Schrick 2022-03-20 14:53:24 -05:00
parent ad8e5866cf
commit 289e60939e
14 changed files with 261 additions and 285 deletions

View File

@ -1,13 +1,13 @@
\relax
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{41}{}\protected@file@percent }
\newlabel{App:A}{{A}{41}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{42}{}\protected@file@percent }
\newlabel{App:B}{{B}{42}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{42}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{42}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{42}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{42}{}\protected@file@percent }
\newlabel{App:A}{{A}{42}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{43}{}\protected@file@percent }
\newlabel{App:B}{{B}{43}}
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{43}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{43}{}\protected@file@percent }
\@setckpt{Appendices}{
\setcounter{page}{43}
\setcounter{page}{44}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}

View File

@ -7,6 +7,7 @@
\citation{zhang_boosting_2017}
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent }
\newlabel{sec:Intro}{{1.1}{1}}
\citation{j_hale_compliance_nodate}
\citation{baloyi_guidelines_2019}
\citation{allman_complying_2006}
@ -18,6 +19,7 @@
\newlabel{CG-alter}{{1.2.2}{2}}
\citation{cook_rage_2018}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.3}\it Difficulties of Compliance Graphs and Introduction to Thesis Work}{3}{}\protected@file@percent }
\newlabel{sec:CG-diff}{{1.2.3}{3}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{4}{}\protected@file@percent }
\@setckpt{Chapter1}{
\setcounter{page}{5}

View File

@ -1,5 +1,5 @@
\TUchapter{INTRODUCTION}
\TUsection{Introduction to Attack Graphs} \label{sec:Into}
\TUsection{Introduction to Attack Graphs} \label{sec:Intro}
Cybersecurity has been at the forefront of computing for decades, and vulnerability analysis modeling has been utilized to mitigate threats to aid in this effort. One such modeling approach
is to represent a system or a set of systems through graphical means, and encode information into the nodes and edges of the graph. Even as early as the late 1990s,
experts have composed various graphical models to map devices and vulnerabilities through attack trees, and this work can be seen through the works published by the authors of \cite{phillips_graph-based_1998}.

View File

@ -29,18 +29,18 @@
\newlabel{table:tasking-tag}{{5.3.2}{33}}
\@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces MPI Tags for the MPI Tasking Approach}}{33}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{MPI Tags}{33}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{33}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.4}\it Results}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{34}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{35}{}\protected@file@percent }
\@setckpt{Chapter5}{
\setcounter{page}{35}
\setcounter{page}{36}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}

View File

@ -128,7 +128,7 @@ To ensure that the intended message is received by each node, the MPI message en
\end{table}
\TUsubsection{Performance Expectations}
Due to the amount of communication between nodes to distribute the necessary data through all stages of the tasking pipeline, this approach is not expected to outperform the serial approach in all cases. This tasking approach was specifically designed to reduce the computation time when the generation of each individual state increases in time. This approach does not offer any guarantees of processing through the frontier at an increased rate; it's main objective is to distribute the workload of individual state generation. As discussed in Section \ref{sec:Intro}, the amount of entries in the National Vulnerability database and any custom vulnerability testing to ensure adequate examination of all assets in the network sums to large number of exploits in the exploit list. Likewise for compliance graphs and compliance examinations, Section \ref{sec:CG-diff} mentioned the number of compliance checks for SOX, HIPAA, GDPR, PCI DSS, and/or any other regulatory compliance also sums to a large number of exploits in the exploit list. Since the generation of each state is largely dependent on the number of exploits present in the exploit list, this approach is best-suited for when the exploit list grows in size.
Due to the amount of communication between nodes to distribute the necessary data through all stages of the tasking pipeline, this approach is not expected to outperform the serial approach in all cases. This tasking approach was specifically designed to reduce the computation time when the generation of each individual state increases in time. This approach does not offer any guarantees of processing through the frontier at an increased rate; it's main objective is to distribute the workload of individual state generation. As discussed in Section \ref{sec:Intro}, the amount of entries in the National Vulnerability database and any custom vulnerability testing to ensure adequate examination of all assets in the network sums to large number of exploits in the exploit list. Likewise for compliance graphs and compliance examinations, Section \ref{sec:CG-diff} discussed that the number of compliance checks for SOX, HIPAA, GDPR, PCI DSS, and/or any other regulatory compliance also sums to a large number of exploits in the exploit list. Since the generation of each state is largely dependent on the number of exploits present in the exploit list, this approach is best-suited for when the exploit list grows in size.
\TUsubsection{Results}
Communication cost of asynchronous send for T4 and T5 is less than the time requirement of a database storage by root.

View File

@ -1,23 +1,23 @@
\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{35}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{36}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{37}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{37}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{37}{}\protected@file@percent }
\@setckpt{Chapter6}{
\setcounter{page}{37}
\setcounter{page}{38}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}

View File

@ -1,8 +1,8 @@
\relax
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{37}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{37}{}\protected@file@percent }
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{38}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{38}{}\protected@file@percent }
\@setckpt{Chapter7}{
\setcounter{page}{38}
\setcounter{page}{39}
\setcounter{equation}{0}
\setcounter{enumi}{4}
\setcounter{enumii}{0}

View File

@ -21,37 +21,37 @@
\@input{Chapter6.aux}
\@input{Chapter7.aux}
\bibdata{Bibliography}
\bibcite{noauthor_boost_nodate}{1}
\bibcite{noauthor_overview_nodate}{2}
\bibcite{ainsworth_graph_2016}{3}
\bibcite{allman_complying_2006}{4}
\bibcite{arifuzzaman_fast_2015}{5}
\bibcite{balaji_graph_2016}{6}
\bibcite{phillips_graph-based_1998}{1}
\bibcite{schneier_modeling_1999}{2}
\bibcite{ou_scalable_2006}{3}
\bibcite{sheyner_automated_2002}{4}
\bibcite{zhang_boosting_2017}{5}
\bibcite{j_hale_compliance_nodate}{6}
\bibcite{baloyi_guidelines_2019}{7}
\bibcite{berry_graph_2007}{8}
\bibcite{allman_complying_2006}{8}
\bibcite{cook_rage_2018}{9}
\bibcite{cook_scalable_2016}{10}
\bibcite{berry_graph_2007}{10}
\@writefile{toc}{{\hfill \ }}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{38}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{39}{}\protected@file@percent }
\@writefile{toc}{\addvspace {10pt}}
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{38}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{39}{}\protected@file@percent }
\@writefile{toc}{{\hfill \ }}
\bibcite{CVE-2019-10747}{11}
\bibcite{dai_fpgp_2016}{12}
\bibcite{j_hale_compliance_nodate}{13}
\bibcite{7087377}{14}
\bibcite{li_combining_2019}{15}
\bibcite{li_concurrency_2019}{16}
\bibcite{9150145}{17}
\bibcite{liakos_memory-optimized_2016}{18}
\bibcite{louthan_hybrid_2011}{19}
\bibcite{ou_scalable_2006}{20}
\bibcite{phillips_graph-based_1998}{21}
\bibcite{schneier_modeling_1999}{22}
\bibcite{sheyner_automated_2002}{23}
\bibcite{yao_efficient_2018}{24}
\bibcite{yu_construction_2018}{25}
\bibcite{zhang_boosting_2017}{26}
\bibstyle{plain}
\bibcite{ainsworth_graph_2016}{11}
\bibcite{yao_efficient_2018}{12}
\bibcite{dai_fpgp_2016}{13}
\bibcite{arifuzzaman_fast_2015}{14}
\bibcite{yu_construction_2018}{15}
\bibcite{liakos_memory-optimized_2016}{16}
\bibcite{balaji_graph_2016}{17}
\bibcite{noauthor_overview_nodate}{18}
\bibcite{noauthor_boost_nodate}{19}
\bibcite{cook_scalable_2016}{20}
\bibcite{li_concurrency_2019}{21}
\bibcite{9150145}{22}
\bibcite{7087377}{23}
\bibcite{li_combining_2019}{24}
\bibcite{CVE-2019-10747}{25}
\bibcite{louthan_hybrid_2011}{26}
\bibstyle{ieeetr}
\@input{Appendices.aux}
\gdef \@abspage@last{52}
\gdef \@abspage@last{53}

View File

@ -1,158 +1,133 @@
\begin{thebibliography}{10}
\bibitem{noauthor_boost_nodate}
The {Boost} {Graph} {Library} - 1.75.0.
\bibitem{phillips_graph-based_1998}
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
F1292, pp.~71--79, 1998.
\bibitem{noauthor_overview_nodate}
An {Overview} of the {Parallel} {Boost} {Graph} {Library} - 1.75.0.
\bibitem{schneier_modeling_1999}
B.~Schneier, ``Modeling {Security} {Threats},'' 1999.
\newblock Publication Title: Dr. Dobb's Journal.
\bibitem{ainsworth_graph_2016}
Sam Ainsworth and Timothy~M. Jones.
\newblock Graph prefetching using data structure knowledge.
\newblock {\em Proceedings of the International Conference on Supercomputing},
01-03-June, 2016.
\bibitem{ou_scalable_2006}
X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack}
{Graph} {Generation},'' pp.~336--345, 2006.
\bibitem{allman_complying_2006}
Eric Allman.
\newblock Complying with {Compliance}: {Blowing} it off is not an option.
\newblock {\em ACM Queue}, 4(7), 2006.
\bibitem{sheyner_automated_2002}
O.~Sheyner, J.~Haines, S.~Jha, R.~Lippmann, and J.~Wing, ``Automated
{Generation} and {Analysis} of {Attack} {Graphs},'' {\em Proceeding of 2002
IEEE Symposium on Security and Privacy}, pp.~254--265, 2002.
\bibitem{arifuzzaman_fast_2015}
Shaikh Arifuzzaman and Maleq Khan.
\newblock Fast parallel conversion of edge list to adjacency list for
large-scale graphs.
\newblock In {\em {HPC} '15: {Proceedings} of the {Symposium} on {High}
{Performance} {Computing}}, pages 17--24, April 2015.
\bibitem{balaji_graph_2016}
Janani Balaji and Rajshekhar Sunderraman.
\newblock Graph {Topology} {Abstraction} for {Distributed} {Path} {Queries}.
\newblock In {\em {HPGP} '16: {Proceedings} of the {ACM} {Workshop} on {High}
{Performance} {Graph} {Processing}}, pages 27--34, May 2016.
\bibitem{baloyi_guidelines_2019}
Ntsako Baloyi and Paula Kotzé.
\newblock Guidelines for {Data} {Privacy} {Compliance}: {A} {Focus} on
{Cyberphysical} {Systems} and {Internet} of {Things}.
\newblock In {\em {SAICSIT} '19: {Proceedings} of the {South} {African}
{Institute} of {Computer} {Scientists} and {Information} {Technologists}
2019}, Skukuza South Africa, 2019. Association for Computing Machinery.
\bibitem{berry_graph_2007}
Jonathan Berry and Bruce Hendrickson.
\newblock Graph {Analysis} with {High} {Performance} {Computing}.
\newblock {\em Computing in Science and Engineering}, 2007.
\bibitem{cook_rage_2018}
Kyle Cook.
\newblock {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}.
\newblock PhD thesis, 2018.
\bibitem{cook_scalable_2016}
Kyle Cook, Thomas Shaw, John Hale, and Peter Hawrylak.
\newblock Scalable attack graph generation.
\newblock {\em Proceedings of the 11th Annual Cyber and Information Security
Research Conference, CISRC 2016}, 2016.
\bibitem{CVE-2019-10747}
{set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1.
The function mixin-deep could be tricked into adding or modifying properties
of Object.prototype using any of the constructor, prototype and $\_$proto$\_$
payloads.}
\newblock National Vulnerability Database, August 2019.
\bibitem{dai_fpgp_2016}
Guohao Dai, Yuze Chi, Yu~Wang, and Huazhong Yang.
\newblock {FPGP}: {Graph} processing framework on {FPGA}: {A} case study of
breadth-first search.
\newblock {\em FPGA 2016 - Proceedings of the 2016 ACM/SIGDA International
Symposium on Field-Programmable Gate Arrays}, pages 105--110, 2016.
\bibitem{zhang_boosting_2017}
J.~Zhang, S.~Khoram, and J.~Li, ``Boosting the performance of {FPGA}-based
graph processor using hybrid memory cube: {A} case for breadth first
search,'' {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International
Symposium on Field-Programmable Gate Arrays}, pp.~207--216, 2017.
\bibitem{j_hale_compliance_nodate}
{J. Hale}, P.~Hawrylak, and M.~Papa.
\newblock Compliance {Method} for a {Cyber}-{Physical} {System}.
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
{Cyber}-{Physical} {System}.''
\bibitem{7087377}
Kerem Kaynar and Fikret Sivrikaya.
\newblock Distributed attack graph generation.
\newblock {\em IEEE Transactions on Dependable and Secure Computing},
13(5):519--532, 2016.
\bibitem{baloyi_guidelines_2019}
N.~Baloyi and P.~Kotzé, ``Guidelines for {Data} {Privacy} {Compliance}: {A}
{Focus} on {Cyberphysical} {Systems} and {Internet} of {Things},'' in {\em
{SAICSIT} '19: {Proceedings} of the {South} {African} {Institute} of
{Computer} {Scientists} and {Information} {Technologists} 2019}, (Skukuza
South Africa), Association for Computing Machinery, 2019.
\bibitem{li_combining_2019}
Ming Li, Peter Hawrylak, and John Hale.
\newblock Combining {OpenCL} and {MPI} to support heterogeneous computing on a
cluster.
\newblock {\em ACM International Conference Proceeding Series}, 2019.
\bibitem{allman_complying_2006}
E.~Allman, ``Complying with {Compliance}: {Blowing} it off is not an option.,''
{\em ACM Queue}, vol.~4, no.~7, 2006.
\bibitem{li_concurrency_2019}
Ming Li, Peter Hawrylak, and John Hale.
\newblock Concurrency {Strategies} for {Attack} {Graph} {Generation}.
\newblock {\em Proceedings - 2019 2nd International Conference on Data
Intelligence and Security, ICDIS 2019}, pages 174--179, 2019.
\bibitem{cook_rage_2018}
K.~Cook, {\em {RAGE}: {The} {Rage} {Attack} {Graph} {Engine}}.
\newblock PhD thesis, 2018.
\bibitem{9150145}
Ming Li, Peter~J. Hawrylak, and John Hale.
\newblock Implementing an attack graph generator in cuda.
\newblock In {\em 2020 IEEE International Parallel and Distributed Processing
Symposium Workshops (IPDPSW)}, pages 730--738, 2020.
\bibitem{berry_graph_2007}
J.~Berry and B.~Hendrickson, ``Graph {Analysis} with {High} {Performance}
{Computing}.,'' {\em Computing in Science and Engineering}, 2007.
\bibitem{ainsworth_graph_2016}
S.~Ainsworth and T.~M. Jones, ``Graph prefetching using data structure
knowledge,'' {\em Proceedings of the International Conference on
Supercomputing}, vol.~01-03-June, 2016.
\bibitem{yao_efficient_2018}
P.~Yao, L.~Zheng, X.~Liao, H.~Jin, and B.~He, ``An efficient graph accelerator
with parallel data conflict management,'' {\em Parallel Architectures and
Compilation Techniques - Conference Proceedings, PACT}, 2018.
\bibitem{dai_fpgp_2016}
G.~Dai, Y.~Chi, Y.~Wang, and H.~Yang, ``{FPGP}: {Graph} processing framework on
{FPGA}: {A} case study of breadth-first search,'' {\em FPGA 2016 -
Proceedings of the 2016 ACM/SIGDA International Symposium on
Field-Programmable Gate Arrays}, pp.~105--110, 2016.
\bibitem{arifuzzaman_fast_2015}
S.~Arifuzzaman and M.~Khan, ``Fast parallel conversion of edge list to
adjacency list for large-scale graphs,'' in {\em {HPC} '15: {Proceedings} of
the {Symposium} on {High} {Performance} {Computing}}, pp.~17--24, Apr. 2015.
\bibitem{yu_construction_2018}
X.~Yu, W.~Chen, J.~Miao, J.~Chen, H.~Mao, Q.~Luo, and L.~Gu, ``The
{Construction} of {Large} {Graph} {Data} {Structures} in a {Scalable}
{Distributed} {Message} {System},'' in {\em {HPCCT} 2018: {Proceedings} of
the 2018 2nd {High} {Performance} {Computing} and {Cluster} {Technologies}
{Conference}}, pp.~6--10, June 2018.
\bibitem{liakos_memory-optimized_2016}
Panagiotis Liakos, Katia Papakonstantinopoulou, and Alex Delis.
\newblock Memory-{Optimized} {Distributed} {Graph} {Processing} through {Novel}
{Compression} {Techniques}.
\newblock In {\em {CIKM} '16: {Proceedings} of the 25th {ACM} {International}
{Conference} on {Information} and {Knowledge} {Management}}, pages
2317--2322, October 2016.
P.~Liakos, K.~Papakonstantinopoulou, and A.~Delis, ``Memory-{Optimized}
{Distributed} {Graph} {Processing} through {Novel} {Compression}
{Techniques},'' in {\em {CIKM} '16: {Proceedings} of the 25th {ACM}
{International} {Conference} on {Information} and {Knowledge} {Management}},
pp.~2317--2322, Oct. 2016.
\bibitem{balaji_graph_2016}
J.~Balaji and R.~Sunderraman, ``Graph {Topology} {Abstraction} for
{Distributed} {Path} {Queries},'' in {\em {HPGP} '16: {Proceedings} of the
{ACM} {Workshop} on {High} {Performance} {Graph} {Processing}}, pp.~27--34,
May 2016.
\bibitem{noauthor_overview_nodate}
``An {Overview} of the {Parallel} {Boost} {Graph} {Library} - 1.75.0.''
\bibitem{noauthor_boost_nodate}
``The {Boost} {Graph} {Library} - 1.75.0.''
\bibitem{cook_scalable_2016}
K.~Cook, T.~Shaw, J.~Hale, and P.~Hawrylak, ``Scalable attack graph
generation,'' {\em Proceedings of the 11th Annual Cyber and Information
Security Research Conference, CISRC 2016}, 2016.
\bibitem{li_concurrency_2019}
M.~Li, P.~Hawrylak, and J.~Hale, ``Concurrency {Strategies} for {Attack}
{Graph} {Generation},'' {\em Proceedings - 2019 2nd International Conference
on Data Intelligence and Security, ICDIS 2019}, pp.~174--179, 2019.
\bibitem{9150145}
M.~Li, P.~J. Hawrylak, and J.~Hale, ``Implementing an attack graph generator in
cuda,'' in {\em 2020 IEEE International Parallel and Distributed Processing
Symposium Workshops (IPDPSW)}, pp.~730--738, 2020.
\bibitem{7087377}
K.~Kaynar and F.~Sivrikaya, ``Distributed attack graph generation,'' {\em IEEE
Transactions on Dependable and Secure Computing}, vol.~13, no.~5,
pp.~519--532, 2016.
\bibitem{li_combining_2019}
M.~Li, P.~Hawrylak, and J.~Hale, ``Combining {OpenCL} and {MPI} to support
heterogeneous computing on a cluster,'' {\em ACM International Conference
Proceeding Series}, 2019.
\bibitem{CVE-2019-10747}
``{set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1.
The function mixin-deep could be tricked into adding or modifying properties
of Object.prototype using any of the constructor, prototype and $\_$proto$\_$
payloads.}.'' National Vulnerability Database, Aug. 2019.
\bibitem{louthan_hybrid_2011}
G~Louthan.
\newblock {\em Hybrid {Attack} {Graphs} for {Modeling} {Cyber}-{Physical}
G.~Louthan, {\em Hybrid {Attack} {Graphs} for {Modeling} {Cyber}-{Physical}
{Systems}}.
\newblock PhD thesis, 2011.
\bibitem{ou_scalable_2006}
Xinming Ou, Wayne~F Boyer, and Miles~A Mcqueen.
\newblock A {Scalable} {Approach} to {Attack} {Graph} {Generation}.
\newblock pages 336--345, 2006.
\bibitem{phillips_graph-based_1998}
Cynthia Phillips and Laura~Painton Swiler.
\newblock A graph-based system for network-vulnerability analysis.
\newblock {\em Proceedings New Security Paradigms Workshop}, Part F1292:71--79,
1998.
\bibitem{schneier_modeling_1999}
Bruce Schneier.
\newblock Modeling {Security} {Threats}, 1999.
\newblock Publication Title: Dr. Dobb's Journal.
\bibitem{sheyner_automated_2002}
O.~Sheyner, J.~Haines, S.~Jha, R.. Lippmann, and J.~Wing.
\newblock Automated {Generation} and {Analysis} of {Attack} {Graphs}.
\newblock {\em Proceeding of 2002 IEEE Symposium on Security and Privacy},
pages 254--265, 2002.
\bibitem{yao_efficient_2018}
Pengcheng Yao, Long Zheng, Xiaofei Liao, Hai Jin, and Bingsheng He.
\newblock An efficient graph accelerator with parallel data conflict
management.
\newblock {\em Parallel Architectures and Compilation Techniques - Conference
Proceedings, PACT}, 2018.
\bibitem{yu_construction_2018}
Xinjie Yu, Wentao Chen, Jiajia Miao, Jian Chen, Handong Mao, Qiong Luo, and Lin
Gu.
\newblock The {Construction} of {Large} {Graph} {Data} {Structures} in a
{Scalable} {Distributed} {Message} {System}.
\newblock In {\em {HPCCT} 2018: {Proceedings} of the 2018 2nd {High}
{Performance} {Computing} and {Cluster} {Technologies} {Conference}}, pages
6--10, June 2018.
\bibitem{zhang_boosting_2017}
Jialiang Zhang, Soroosh Khoram, and Jing Li.
\newblock Boosting the performance of {FPGA}-based graph processor using hybrid
memory cube: {A} case for breadth first search.
\newblock {\em FPGA 2017 - Proceedings of the 2017 ACM/SIGDA International
Symposium on Field-Programmable Gate Arrays}, pages 207--216, 2017.
\end{thebibliography}

View File

@ -8,55 +8,53 @@ A level-1 auxiliary file: Chapter4.aux
A level-1 auxiliary file: Chapter5.aux
A level-1 auxiliary file: Chapter6.aux
A level-1 auxiliary file: Chapter7.aux
The style file: plain.bst
The style file: ieeetr.bst
A level-1 auxiliary file: Appendices.aux
Database file #1: Bibliography.bib
Warning--entry type for "j_hale_compliance_nodate" isn't style-file defined
--line 272 of file Bibliography.bib
Warning--to sort, need author or key in noauthor_overview_nodate
Warning--to sort, need author or key in noauthor_boost_nodate
Warning--empty journal in ou_scalable_2006
Warning--empty school in cook_rage_2018
Warning--empty school in louthan_hybrid_2011
Warning--empty journal in ou_scalable_2006
You've used 26 entries,
2118 wiz_defined-function locations,
632 strings with 9141 characters,
and the built_in function-call counts, 8609 in all, are:
= -- 845
> -- 388
< -- 10
+ -- 160
- -- 128
* -- 527
:= -- 1360
add.period$ -- 73
1876 wiz_defined-function locations,
611 strings with 8617 characters,
and the built_in function-call counts, 6036 in all, are:
= -- 571
> -- 237
< -- 0
+ -- 90
- -- 64
* -- 401
:= -- 842
add.period$ -- 26
call.type$ -- 26
change.case$ -- 141
change.case$ -- 24
chr.to.int$ -- 0
cite$ -- 31
duplicate$ -- 358
empty$ -- 679
format.name$ -- 128
if$ -- 1858
cite$ -- 29
duplicate$ -- 317
empty$ -- 623
format.name$ -- 64
if$ -- 1474
int.to.chr$ -- 0
int.to.str$ -- 26
missing$ -- 19
newline$ -- 127
num.names$ -- 46
pop$ -- 177
newline$ -- 84
num.names$ -- 23
pop$ -- 119
preamble$ -- 1
purify$ -- 117
purify$ -- 0
quote$ -- 0
skip$ -- 312
skip$ -- 210
stack$ -- 0
substring$ -- 471
swap$ -- 114
text.length$ -- 10
substring$ -- 347
swap$ -- 108
text.length$ -- 0
text.prefix$ -- 0
top$ -- 0
type$ -- 104
warning$ -- 5
while$ -- 78
type$ -- 0
warning$ -- 3
while$ -- 57
width$ -- 28
write$ -- 262
(There were 6 warnings)
write$ -- 223
(There were 4 warnings)

View File

@ -1,4 +1,4 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 20 MAR 2022 13:08
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 20 MAR 2022 14:51
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
@ -316,39 +316,39 @@ Package pdftex.def Info: ./Chapter5_img/Task1-Case2.png used on input line 86.
LaTeX Warning: No positions in optional float specifier.
Default added (so using `tbp') on input line 104.
[33]) [34]
[33] [34]) [35]
\openout2 = `Chapter6.aux'.
(./Chapter6.tex
CHAPTER 6.
[35
[36
]) [36]
]) [37]
\openout2 = `Chapter7.aux'.
(./Chapter7.tex
CHAPTER 7.
) [37
) [38
] (./Schrick-Noah_MS-Thesis.bbl [38
] (./Schrick-Noah_MS-Thesis.bbl [39
] [39])
] [40])
\c@appendixno=\count269
[40]
[41]
\openout2 = `Appendices.aux'.
(./Appendices.tex [41
(./Appendices.tex [42
])
[42] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
[43] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
(./Chapter7.aux) (./Appendices.aux)) )
(\end occurred inside a group at level 6)
@ -361,13 +361,13 @@ CHAPTER 7.
### semi simple group (level 1) entered at line 52 (\begingroup)
### bottom level
Here is how much of TeX's memory you used:
2226 strings out of 478353
40184 string characters out of 5854635
345111 words of memory out of 5000000
20288 multiletter control sequences out of 15000+600000
2228 strings out of 478353
40208 string characters out of 5854635
345133 words of memory out of 5000000
20290 multiletter control sequences out of 15000+600000
407326 words of font info for 40 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
55i,8n,62p,1109b,1305s stack positions out of 5000i,500n,10000p,200000b,80000s
55i,8n,62p,1290b,1305s stack positions out of 5000i,500n,10000p,200000b,80000s
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
@ -376,10 +376,10 @@ ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
y10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmti12.pfb></usr/
share/texmf-dist/fonts/type1/public/amsfonts/cm/cmtt12.pfb></usr/share/texmf-di
st/fonts/type1/public/cm-super/sfrm1200.pfb>
Output written on Schrick-Noah_MS-Thesis.pdf (52 pages, 598425 bytes).
Output written on Schrick-Noah_MS-Thesis.pdf (53 pages, 599307 bytes).
PDF statistics:
232 PDF objects out of 1000 (max. 8388607)
143 compressed objects within 2 object streams
235 PDF objects out of 1000 (max. 8388607)
145 compressed objects within 2 object streams
0 named destinations out of 1000 (max. 500000)
51 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

View File

@ -217,7 +217,8 @@ over the place.
\addcontentsline{toc}{section}{\contentsadj NOMENCLATURE}
\bibliographyp
\bibliography{Bibliography}
\bibliographystyle{plain}
%\bibliographystyle{plain}
\bibliographystyle{ieeetr}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% APPENDICES AS NECESSARY

View File

@ -56,42 +56,42 @@
\contentsline {subsubsection}{Task 3}{32}{}%
\contentsline {subsubsection}{Task 4 and Task 5}{32}{}%
\contentsline {subsubsection}{MPI Tags}{33}{}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{33}{}%
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{34}{}%
\contentsline {subsection}{\numberline {5.3.4}\it Results}{34}{}%
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{34}{}%
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{34}{}%
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{34}{}%
\contentsline {subsubsection}{Communication Structure}{34}{}%
\contentsline {subsubsection}{Worker Nodes}{34}{}%
\contentsline {subsubsection}{Root Node}{34}{}%
\contentsline {subsubsection}{Database Node}{34}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{34}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{35}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{35}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{35}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{35}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{35}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{35}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{35}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{35}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{35}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{35}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{35}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{35}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{35}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{35}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{36}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{36}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{36}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{37}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{37}{}%
\contentsline {subsubsection}{Root Node}{35}{}%
\contentsline {subsubsection}{Database Node}{35}{}%
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{35}{}%
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{36}{}%
\contentsline {section}{\numberline {6.1}\bf Small Networks}{36}{}%
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{36}{}%
\contentsline {subsection}{\numberline {6.1.2}\it Results}{36}{}%
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{36}{}%
\contentsline {section}{\numberline {6.2}\bf Large Networks}{36}{}%
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{36}{}%
\contentsline {subsection}{\numberline {6.2.2}\it Results}{36}{}%
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{36}{}%
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{36}{}%
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{36}{}%
\contentsline {subsection}{\numberline {6.3.2}\it Results}{36}{}%
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{36}{}%
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{36}{}%
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{37}{}%
\contentsline {subsection}{\numberline {6.4.2}\it Results}{37}{}%
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{37}{}%
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{38}{}%
\contentsline {section}{\numberline {7.1}\bf Future Work}{38}{}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{38}{}%
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{39}{}%
\addvspace {10pt}
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{38}{}%
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{39}{}%
{\hfill \ }
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{41}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{42}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{42}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{42}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{42}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{42}{}%
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{43}{}%
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{43}{}%
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{43}{}%
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{43}{}%