Sync Fire finishing, MPI Alg Design
This commit is contained in:
parent
37d8d60de6
commit
66e2488c50
@ -1,13 +1,13 @@
|
||||
\relax
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{35}{}\protected@file@percent }
|
||||
\newlabel{App:A}{{A}{35}}
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{36}{}\protected@file@percent }
|
||||
\newlabel{App:B}{{B}{36}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{36}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{36}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{36}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{36}{}\protected@file@percent }
|
||||
\newlabel{App:A}{{A}{36}}
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{37}{}\protected@file@percent }
|
||||
\newlabel{App:B}{{B}{37}}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{37}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{37}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{37}{}\protected@file@percent }
|
||||
\@setckpt{Appendices}{
|
||||
\setcounter{page}{37}
|
||||
\setcounter{page}{38}
|
||||
\setcounter{equation}{0}
|
||||
\setcounter{enumi}{4}
|
||||
\setcounter{enumii}{0}
|
||||
|
||||
@ -22,11 +22,11 @@
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{21}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{22}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{22}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{22}{}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process}}{23}{}\protected@file@percent }
|
||||
\newlabel{fig:sync-fire}{{4.3}{23}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{24}{}\protected@file@percent }
|
||||
\@setckpt{Chapter4}{
|
||||
\setcounter{page}{24}
|
||||
\setcounter{page}{25}
|
||||
\setcounter{equation}{0}
|
||||
\setcounter{enumi}{4}
|
||||
\setcounter{enumii}{0}
|
||||
|
||||
23
Chapter4.tex
23
Chapter4.tex
@ -90,7 +90,30 @@ The implementation of synchronous firing in the graph generation process relies
|
||||
|
||||
|
||||
\TUsection{Example Networks and Results}
|
||||
All data was collected on a 13 node cluster, with 12 nodes serving as dedicated compute nodes, and 1 node serving as the login node. Each compute node has a configuration as follows:
|
||||
\begin{itemize}
|
||||
\item{OS: CentOS release 6.9}
|
||||
\item{CPU: Two Intel Xeon E5-2620 v3}
|
||||
\item{Two Intel Xeon Phi Co-Processors}
|
||||
\item{One FPGA (Nallatech PCIE-385n A7 Altera Stratix V)}
|
||||
\item{Memory: 64318MiB}
|
||||
\end{itemize}
|
||||
All nodes are connected with an Infiniband interconnect.
|
||||
|
||||
\TUsubsection{Example Networks}
|
||||
The example networks for testing the effectiveness of synchronous firing follow the compliance graph generation approach. These networks analyze two assets, both of which are identical 2006 Toyota Corolla cars with identical qualities. The generation examines both cars at their current states, and proceeds to advance in time by a pre-determined amount, up to a pre-determined limit. Each time increment updates each car by an identical amount of mileage. During the generation process, it is determined if a car is out of compliance either through mileage or time since last maintenance in accordance with the Toyota Corolla Maintenance Schedule manual.
|
||||
|
||||
In addition, the tests employ the use of ``services", where if a car is out of compliance, it will go through a correction process and reset the mileage and time since last service. Each test varies in the number of services used. The 1 Service test only employs one service, and it is dedicated to brake pads. The 2 Service test employs two services, where the first service is dedicated to the brake pads, and the second is for exhaust pipes. This process extends to the 3 and 4 Service tests.
|
||||
The testing information is as follows:
|
||||
\begin{itemize}
|
||||
\item{All tests ran for 12 months, with time steps of 1 month.}
|
||||
\item{All tests had the same number of compliance checks: brake pads, exhaust pipes, vacuum pumps, and AC filters.}
|
||||
\item{There were 10 base exploits, and an additional 4 exploits were individually added in the form of services for each test.}
|
||||
\item{All tests used the same network model.}
|
||||
\item{All tests used the same exploit file, with the exception of the ``group" keyword being present in the synchronous firing testing.}
|
||||
\item{Services must be performed prior to advancing time, if services are applicable.}
|
||||
\item{Graph visualization was not timed. Only the generation and database operation time was measured.}
|
||||
\end{itemize}
|
||||
|
||||
\TUsubsection{Results}
|
||||
|
||||
|
||||
58
Chapter5.aux
58
Chapter5.aux
@ -1,36 +1,36 @@
|
||||
\relax
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{24}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{24}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{24}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{24}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{25}{}\protected@file@percent }
|
||||
\citation{cook_rage_2018}
|
||||
\citation{li_concurrency_2019}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task One}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{25}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{25}{}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{26}{}\protected@file@percent }
|
||||
\newlabel{fig:RAGE_chart}{{5.1}{26}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{27}{}\protected@file@percent }
|
||||
\newlabel{fig:tasks}{{5.2}{27}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{28}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task One}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{26}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{26}{}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{27}{}\protected@file@percent }
|
||||
\newlabel{fig:RAGE_chart}{{5.1}{27}}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{28}{}\protected@file@percent }
|
||||
\newlabel{fig:tasks}{{5.2}{28}}
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{29}{}\protected@file@percent }
|
||||
\@setckpt{Chapter5}{
|
||||
\setcounter{page}{29}
|
||||
\setcounter{page}{30}
|
||||
\setcounter{equation}{0}
|
||||
\setcounter{enumi}{4}
|
||||
\setcounter{enumii}{0}
|
||||
|
||||
20
Chapter5.tex
20
Chapter5.tex
@ -31,20 +31,13 @@ did not expose enough information for the non-intrusive approach to be viable.
|
||||
|
||||
\TUsection{Tasking Approach}
|
||||
\TUsubsection{Introduction to the Tasking Approach}
|
||||
The high-level overview of the RAGE Data Flow Diagram was presented by the author of
|
||||
\cite{cook_rage_2018}, and can be seen in Figure \ref{fig:RAGE_chart}. This diagram
|
||||
includes an attack graph generation block that can be broken down into six main tasks.
|
||||
The high-level overview of the compliance graph generation process can be broken down into six main tasks.
|
||||
These tasks are described in Figure \ref{fig:tasks}. Prior works such as that seen by the
|
||||
authors of \cite{li_concurrency_2019} work to parallelize the attack graph generation using
|
||||
OpenMP by dividing the frontier. This approach, however, utilizes Message Passing Interface (MPI)
|
||||
to distribute the six tasks to examine the effect on speedup, efficiency, and scalability for
|
||||
attack graph generation.
|
||||
\begin{figure}[htp]
|
||||
\includegraphics[width=\linewidth]{"./Chapter5_img/RAGE_Chart.png"}
|
||||
\vspace{.2truein} \centerline{}
|
||||
\caption{Generation Flowchart of RAGE}
|
||||
\label{fig:RAGE_chart}
|
||||
\end{figure}
|
||||
authors of \cite{li_concurrency_2019}, \cite{9150145}, and \cite{7087377} work to parallelize the graph generation using
|
||||
OpenMP, CUDA, and hyper-graph partitioning. This approach, however, utilizes Message Passing Interface (MPI)
|
||||
to distribute the six identified tasks of RAGE to examine the effect on speedup, efficiency, and scalability for
|
||||
attack and compliance graph generation.
|
||||
|
||||
\begin{figure}[htp]
|
||||
\includegraphics[width=\linewidth]{"./Chapter5_img/horiz_task.drawio.png"}
|
||||
\vspace{.2truein} \centerline{}
|
||||
@ -53,6 +46,7 @@ attack graph generation.
|
||||
\end{figure}
|
||||
|
||||
\TUsubsection{Algorithm Design}
|
||||
The design of the tasking approach is to leverage a pipeline structure with the six tasks and MPI nodes. Each stage of the pipeline will pass the necessary data to the next stage through various MPI messages, where the next stage's nodes will receive the data and execute their tasks. The pipeline is considered fully saturated when each task has a dedicated node. When there are less nodes than tasks, some nodes will processing multiple tasks. When there are more nodes than tasks, additional nodes will be assigned to Tasks 1 and 2. Timings were collected in the serial approach for various networks that displayed more time requirements for Tasks 1 and 2, with larger network sizes requiring vastly more time to be taken in Tasks 1 and 2. As a result, additional nodes are assigned to Tasks 1 and 2.
|
||||
\TUsubsubsection{Communication Structure}
|
||||
\TUsubsubsection{Task Zero}
|
||||
\TUsubsubsection{Task One}
|
||||
|
||||
36
Chapter6.aux
36
Chapter6.aux
@ -1,23 +1,23 @@
|
||||
\relax
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{29}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{30}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{31}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{31}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{31}{}\protected@file@percent }
|
||||
\@setckpt{Chapter6}{
|
||||
\setcounter{page}{31}
|
||||
\setcounter{page}{32}
|
||||
\setcounter{equation}{0}
|
||||
\setcounter{enumi}{4}
|
||||
\setcounter{enumii}{0}
|
||||
|
||||
@ -1,8 +1,8 @@
|
||||
\relax
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{31}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{31}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{32}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{32}{}\protected@file@percent }
|
||||
\@setckpt{Chapter7}{
|
||||
\setcounter{page}{32}
|
||||
\setcounter{page}{33}
|
||||
\setcounter{equation}{0}
|
||||
\setcounter{enumi}{4}
|
||||
\setcounter{enumii}{0}
|
||||
|
||||
@ -32,9 +32,9 @@
|
||||
\bibcite{cook_rage_2018}{9}
|
||||
\bibcite{cook_scalable_2016}{10}
|
||||
\@writefile{toc}{{\hfill \ }}
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{32}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{33}{}\protected@file@percent }
|
||||
\@writefile{toc}{\addvspace {10pt}}
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{32}{}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{33}{}\protected@file@percent }
|
||||
\@writefile{toc}{{\hfill \ }}
|
||||
\bibcite{CVE-2019-10747}{11}
|
||||
\bibcite{dai_fpgp_2016}{12}
|
||||
@ -54,4 +54,4 @@
|
||||
\bibcite{zhang_boosting_2017}{26}
|
||||
\bibstyle{plain}
|
||||
\@input{Appendices.aux}
|
||||
\gdef \@abspage@last{46}
|
||||
\gdef \@abspage@last{47}
|
||||
|
||||
@ -4,5 +4,5 @@
|
||||
\contentsline {figure}{\numberline {4.1}{\ignorespaces A network without Synchronous Firing generating infeasible states}}{18}{}%
|
||||
\contentsline {figure}{\numberline {4.2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program}}{21}{}%
|
||||
\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process}}{23}{}%
|
||||
\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{26}{}%
|
||||
\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{27}{}%
|
||||
\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{27}{}%
|
||||
\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{28}{}%
|
||||
|
||||
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 17 MAR 2022 15:54
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 17 MAR 2022 18:17
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
@ -267,62 +267,62 @@ File: ./Chapter4_img/Sync-Fire.png Graphic file (type png)
|
||||
<use ./Chapter4_img/Sync-Fire.png>
|
||||
Package pdftex.def Info: ./Chapter4_img/Sync-Fire.png used on input line 85.
|
||||
(pdftex.def) Requested size: 244.9144pt x 526.46559pt.
|
||||
) [22] [23 <./Chapter4_img/Sync-Fire.png>]
|
||||
[22] [23 <./Chapter4_img/Sync-Fire.png>]) [24]
|
||||
\openout2 = `Chapter5.aux'.
|
||||
|
||||
(./Chapter5.tex
|
||||
CHAPTER 5.
|
||||
[24
|
||||
[25
|
||||
|
||||
|
||||
|
||||
|
||||
]
|
||||
<./Chapter5_img/RAGE_Chart.png, id=126, 495.8525pt x 557.08125pt>
|
||||
<./Chapter5_img/RAGE_Chart.png, id=129, 495.8525pt x 557.08125pt>
|
||||
File: ./Chapter5_img/RAGE_Chart.png Graphic file (type png)
|
||||
<use ./Chapter5_img/RAGE_Chart.png>
|
||||
Package pdftex.def Info: ./Chapter5_img/RAGE_Chart.png used on input line 43.
|
||||
(pdftex.def) Requested size: 469.75499pt x 527.76213pt.
|
||||
<./Chapter5_img/horiz_task.drawio.png, id=127, 1125.20375pt x 738.76pt>
|
||||
<./Chapter5_img/horiz_task.drawio.png, id=130, 1125.20375pt x 738.76pt>
|
||||
File: ./Chapter5_img/horiz_task.drawio.png Graphic file (type png)
|
||||
<use ./Chapter5_img/horiz_task.drawio.png>
|
||||
Package pdftex.def Info: ./Chapter5_img/horiz_task.drawio.png used on input li
|
||||
ne 49.
|
||||
(pdftex.def) Requested size: 469.75499pt x 308.4171pt.
|
||||
[25] [26 <./Chapter5_img/RAGE_Chart.png>] [27 <./Chapter5_img/horiz_task.drawi
|
||||
o.png>]) [28]
|
||||
[26] [27 <./Chapter5_img/RAGE_Chart.png>] [28 <./Chapter5_img/horiz_task.drawi
|
||||
o.png>]) [29]
|
||||
\openout2 = `Chapter6.aux'.
|
||||
|
||||
(./Chapter6.tex
|
||||
CHAPTER 6.
|
||||
[29
|
||||
[30
|
||||
|
||||
|
||||
|
||||
|
||||
]) [30]
|
||||
]) [31]
|
||||
\openout2 = `Chapter7.aux'.
|
||||
|
||||
(./Chapter7.tex
|
||||
CHAPTER 7.
|
||||
) [31
|
||||
) [32
|
||||
|
||||
|
||||
|
||||
|
||||
] (./Schrick-Noah_MS-Thesis.bbl [32
|
||||
] (./Schrick-Noah_MS-Thesis.bbl [33
|
||||
|
||||
|
||||
|
||||
] [33])
|
||||
] [34])
|
||||
\c@appendixno=\count269
|
||||
[34]
|
||||
[35]
|
||||
\openout2 = `Appendices.aux'.
|
||||
|
||||
(./Appendices.tex [35
|
||||
(./Appendices.tex [36
|
||||
|
||||
])
|
||||
[36] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
|
||||
[37] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
|
||||
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
|
||||
(./Chapter7.aux) (./Appendices.aux)) )
|
||||
(\end occurred inside a group at level 6)
|
||||
@ -350,10 +350,10 @@ ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
|
||||
y10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmti12.pfb></usr/
|
||||
share/texmf-dist/fonts/type1/public/amsfonts/cm/cmtt12.pfb></usr/share/texmf-di
|
||||
st/fonts/type1/public/cm-super/sfrm1200.pfb>
|
||||
Output written on Schrick-Noah_MS-Thesis.pdf (46 pages, 474895 bytes).
|
||||
Output written on Schrick-Noah_MS-Thesis.pdf (47 pages, 477063 bytes).
|
||||
PDF statistics:
|
||||
206 PDF objects out of 1000 (max. 8388607)
|
||||
130 compressed objects within 2 object streams
|
||||
209 PDF objects out of 1000 (max. 8388607)
|
||||
132 compressed objects within 2 object streams
|
||||
0 named destinations out of 1000 (max. 500000)
|
||||
36 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
||||
Binary file not shown.
@ -40,57 +40,57 @@
|
||||
\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{21}{}%
|
||||
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{22}{}%
|
||||
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{22}{}%
|
||||
\contentsline {subsection}{\numberline {4.3.2}\it Results}{22}{}%
|
||||
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{24}{}%
|
||||
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{24}{}%
|
||||
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{24}{}%
|
||||
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{24}{}%
|
||||
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{25}{}%
|
||||
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{25}{}%
|
||||
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{25}{}%
|
||||
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{25}{}%
|
||||
\contentsline {subsubsection}{Communication Structure}{25}{}%
|
||||
\contentsline {subsubsection}{Task Zero}{25}{}%
|
||||
\contentsline {subsubsection}{Task One}{25}{}%
|
||||
\contentsline {subsubsection}{Task Two}{25}{}%
|
||||
\contentsline {subsubsection}{Task Three}{25}{}%
|
||||
\contentsline {subsubsection}{Task Four}{28}{}%
|
||||
\contentsline {subsubsection}{Task Five}{28}{}%
|
||||
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{28}{}%
|
||||
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{28}{}%
|
||||
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{28}{}%
|
||||
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{28}{}%
|
||||
\contentsline {subsubsection}{Communication Structure}{28}{}%
|
||||
\contentsline {subsubsection}{Worker Nodes}{28}{}%
|
||||
\contentsline {subsubsection}{Root Node}{28}{}%
|
||||
\contentsline {subsubsection}{Database Node}{28}{}%
|
||||
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{28}{}%
|
||||
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{29}{}%
|
||||
\contentsline {section}{\numberline {6.1}\bf Small Networks}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.1.2}\it Results}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{29}{}%
|
||||
\contentsline {section}{\numberline {6.2}\bf Large Networks}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}\it Results}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{29}{}%
|
||||
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.3.2}\it Results}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{29}{}%
|
||||
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{29}{}%
|
||||
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.4.2}\it Results}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{30}{}%
|
||||
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{31}{}%
|
||||
\contentsline {section}{\numberline {7.1}\bf Future Work}{31}{}%
|
||||
\contentsline {subsection}{\numberline {4.3.2}\it Results}{24}{}%
|
||||
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{25}{}%
|
||||
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{25}{}%
|
||||
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{25}{}%
|
||||
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{25}{}%
|
||||
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{26}{}%
|
||||
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{26}{}%
|
||||
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{26}{}%
|
||||
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{26}{}%
|
||||
\contentsline {subsubsection}{Communication Structure}{26}{}%
|
||||
\contentsline {subsubsection}{Task Zero}{26}{}%
|
||||
\contentsline {subsubsection}{Task One}{26}{}%
|
||||
\contentsline {subsubsection}{Task Two}{26}{}%
|
||||
\contentsline {subsubsection}{Task Three}{26}{}%
|
||||
\contentsline {subsubsection}{Task Four}{29}{}%
|
||||
\contentsline {subsubsection}{Task Five}{29}{}%
|
||||
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{29}{}%
|
||||
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{29}{}%
|
||||
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{29}{}%
|
||||
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{29}{}%
|
||||
\contentsline {subsubsection}{Communication Structure}{29}{}%
|
||||
\contentsline {subsubsection}{Worker Nodes}{29}{}%
|
||||
\contentsline {subsubsection}{Root Node}{29}{}%
|
||||
\contentsline {subsubsection}{Database Node}{29}{}%
|
||||
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{29}{}%
|
||||
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{30}{}%
|
||||
\contentsline {section}{\numberline {6.1}\bf Small Networks}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.1.2}\it Results}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{30}{}%
|
||||
\contentsline {section}{\numberline {6.2}\bf Large Networks}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.2.2}\it Results}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{30}{}%
|
||||
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.3.2}\it Results}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{30}{}%
|
||||
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{30}{}%
|
||||
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{31}{}%
|
||||
\contentsline {subsection}{\numberline {6.4.2}\it Results}{31}{}%
|
||||
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{31}{}%
|
||||
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{32}{}%
|
||||
\contentsline {section}{\numberline {7.1}\bf Future Work}{32}{}%
|
||||
{\hfill \ }
|
||||
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{32}{}%
|
||||
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{33}{}%
|
||||
\addvspace {10pt}
|
||||
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{32}{}%
|
||||
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{33}{}%
|
||||
{\hfill \ }
|
||||
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{35}{}%
|
||||
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{36}{}%
|
||||
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{36}{}%
|
||||
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{36}{}%
|
||||
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{36}{}%
|
||||
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{36}{}%
|
||||
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{37}{}%
|
||||
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{37}{}%
|
||||
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{37}{}%
|
||||
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{37}{}%
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user