From 66e2488c5086c23f3530f9fac1dcdeaf25f8ea95 Mon Sep 17 00:00:00 2001 From: noah Date: Thu, 17 Mar 2022 22:35:27 -0500 Subject: [PATCH] Sync Fire finishing, MPI Alg Design --- Appendices.aux | 16 +++--- Chapter4.aux | 4 +- Chapter4.tex | 23 +++++++++ Chapter5.aux | 58 ++++++++++----------- Chapter5.tex | 20 +++----- Chapter6.aux | 36 ++++++------- Chapter7.aux | 6 +-- Schrick-Noah_MS-Thesis.aux | 6 +-- Schrick-Noah_MS-Thesis.lof | 4 +- Schrick-Noah_MS-Thesis.log | 36 ++++++------- Schrick-Noah_MS-Thesis.pdf | Bin 474895 -> 477063 bytes Schrick-Noah_MS-Thesis.toc | 102 ++++++++++++++++++------------------- 12 files changed, 164 insertions(+), 147 deletions(-) diff --git a/Appendices.aux b/Appendices.aux index cd3cbb4..44cad09 100644 --- a/Appendices.aux +++ b/Appendices.aux @@ -1,13 +1,13 @@ \relax -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{35}{}\protected@file@percent } -\newlabel{App:A}{{A}{35}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{36}{}\protected@file@percent } -\newlabel{App:B}{{B}{36}} -\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{36}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{36}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{36}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{36}{}\protected@file@percent } +\newlabel{App:A}{{A}{36}} +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{37}{}\protected@file@percent } +\newlabel{App:B}{{B}{37}} +\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{37}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{37}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{37}{}\protected@file@percent } \@setckpt{Appendices}{ -\setcounter{page}{37} +\setcounter{page}{38} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Chapter4.aux b/Chapter4.aux index 015d0d3..f0f42ce 100644 --- a/Chapter4.aux +++ b/Chapter4.aux @@ -22,11 +22,11 @@ \@writefile{toc}{\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{21}{}\protected@file@percent } \@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{22}{}\protected@file@percent } \@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{22}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{22}{}\protected@file@percent } \@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process}}{23}{}\protected@file@percent } \newlabel{fig:sync-fire}{{4.3}{23}} +\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{24}{}\protected@file@percent } \@setckpt{Chapter4}{ -\setcounter{page}{24} +\setcounter{page}{25} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Chapter4.tex b/Chapter4.tex index 86acd84..8d95705 100644 --- a/Chapter4.tex +++ b/Chapter4.tex @@ -90,7 +90,30 @@ The implementation of synchronous firing in the graph generation process relies \TUsection{Example Networks and Results} +All data was collected on a 13 node cluster, with 12 nodes serving as dedicated compute nodes, and 1 node serving as the login node. Each compute node has a configuration as follows: +\begin{itemize} +\item{OS: CentOS release 6.9} +\item{CPU: Two Intel Xeon E5-2620 v3} +\item{Two Intel Xeon Phi Co-Processors} +\item{One FPGA (Nallatech PCIE-385n A7 Altera Stratix V)} +\item{Memory: 64318MiB} +\end{itemize} +All nodes are connected with an Infiniband interconnect. + \TUsubsection{Example Networks} +The example networks for testing the effectiveness of synchronous firing follow the compliance graph generation approach. These networks analyze two assets, both of which are identical 2006 Toyota Corolla cars with identical qualities. The generation examines both cars at their current states, and proceeds to advance in time by a pre-determined amount, up to a pre-determined limit. Each time increment updates each car by an identical amount of mileage. During the generation process, it is determined if a car is out of compliance either through mileage or time since last maintenance in accordance with the Toyota Corolla Maintenance Schedule manual. + +In addition, the tests employ the use of ``services", where if a car is out of compliance, it will go through a correction process and reset the mileage and time since last service. Each test varies in the number of services used. The 1 Service test only employs one service, and it is dedicated to brake pads. The 2 Service test employs two services, where the first service is dedicated to the brake pads, and the second is for exhaust pipes. This process extends to the 3 and 4 Service tests. +The testing information is as follows: +\begin{itemize} +\item{All tests ran for 12 months, with time steps of 1 month.} +\item{All tests had the same number of compliance checks: brake pads, exhaust pipes, vacuum pumps, and AC filters.} +\item{There were 10 base exploits, and an additional 4 exploits were individually added in the form of services for each test.} +\item{All tests used the same network model.} +\item{All tests used the same exploit file, with the exception of the ``group" keyword being present in the synchronous firing testing.} +\item{Services must be performed prior to advancing time, if services are applicable.} +\item{Graph visualization was not timed. Only the generation and database operation time was measured.} +\end{itemize} \TUsubsection{Results} diff --git a/Chapter5.aux b/Chapter5.aux index b682331..48face3 100644 --- a/Chapter5.aux +++ b/Chapter5.aux @@ -1,36 +1,36 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{24}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{24}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{24}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{24}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{25}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{25}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{25}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{25}{}\protected@file@percent } \citation{cook_rage_2018} \citation{li_concurrency_2019} -\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task One}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Two}{25}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Three}{25}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{26}{}\protected@file@percent } -\newlabel{fig:RAGE_chart}{{5.1}{26}} -\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{27}{}\protected@file@percent } -\newlabel{fig:tasks}{{5.2}{27}} -\@writefile{toc}{\contentsline {subsubsection}{Task Four}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Task Five}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Root Node}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{Database Node}{28}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{28}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task One}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Two}{26}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Three}{26}{}\protected@file@percent } +\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{27}{}\protected@file@percent } +\newlabel{fig:RAGE_chart}{{5.1}{27}} +\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{28}{}\protected@file@percent } +\newlabel{fig:tasks}{{5.2}{28}} +\@writefile{toc}{\contentsline {subsubsection}{Task Four}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Five}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Root Node}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Database Node}{29}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{29}{}\protected@file@percent } \@setckpt{Chapter5}{ -\setcounter{page}{29} +\setcounter{page}{30} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Chapter5.tex b/Chapter5.tex index 1767a79..92312a9 100644 --- a/Chapter5.tex +++ b/Chapter5.tex @@ -31,20 +31,13 @@ did not expose enough information for the non-intrusive approach to be viable. \TUsection{Tasking Approach} \TUsubsection{Introduction to the Tasking Approach} -The high-level overview of the RAGE Data Flow Diagram was presented by the author of -\cite{cook_rage_2018}, and can be seen in Figure \ref{fig:RAGE_chart}. This diagram -includes an attack graph generation block that can be broken down into six main tasks. +The high-level overview of the compliance graph generation process can be broken down into six main tasks. These tasks are described in Figure \ref{fig:tasks}. Prior works such as that seen by the -authors of \cite{li_concurrency_2019} work to parallelize the attack graph generation using -OpenMP by dividing the frontier. This approach, however, utilizes Message Passing Interface (MPI) -to distribute the six tasks to examine the effect on speedup, efficiency, and scalability for -attack graph generation. -\begin{figure}[htp] - \includegraphics[width=\linewidth]{"./Chapter5_img/RAGE_Chart.png"} - \vspace{.2truein} \centerline{} - \caption{Generation Flowchart of RAGE} - \label{fig:RAGE_chart} -\end{figure} +authors of \cite{li_concurrency_2019}, \cite{9150145}, and \cite{7087377} work to parallelize the graph generation using +OpenMP, CUDA, and hyper-graph partitioning. This approach, however, utilizes Message Passing Interface (MPI) +to distribute the six identified tasks of RAGE to examine the effect on speedup, efficiency, and scalability for +attack and compliance graph generation. + \begin{figure}[htp] \includegraphics[width=\linewidth]{"./Chapter5_img/horiz_task.drawio.png"} \vspace{.2truein} \centerline{} @@ -53,6 +46,7 @@ attack graph generation. \end{figure} \TUsubsection{Algorithm Design} +The design of the tasking approach is to leverage a pipeline structure with the six tasks and MPI nodes. Each stage of the pipeline will pass the necessary data to the next stage through various MPI messages, where the next stage's nodes will receive the data and execute their tasks. The pipeline is considered fully saturated when each task has a dedicated node. When there are less nodes than tasks, some nodes will processing multiple tasks. When there are more nodes than tasks, additional nodes will be assigned to Tasks 1 and 2. Timings were collected in the serial approach for various networks that displayed more time requirements for Tasks 1 and 2, with larger network sizes requiring vastly more time to be taken in Tasks 1 and 2. As a result, additional nodes are assigned to Tasks 1 and 2. \TUsubsubsection{Communication Structure} \TUsubsubsection{Task Zero} \TUsubsubsection{Task One} diff --git a/Chapter6.aux b/Chapter6.aux index 1f4bd2a..3e3762b 100644 --- a/Chapter6.aux +++ b/Chapter6.aux @@ -1,23 +1,23 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{29}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{30}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{30}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{30}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{31}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{31}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{31}{}\protected@file@percent } \@setckpt{Chapter6}{ -\setcounter{page}{31} +\setcounter{page}{32} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Chapter7.aux b/Chapter7.aux index ecad198..3735362 100644 --- a/Chapter7.aux +++ b/Chapter7.aux @@ -1,8 +1,8 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{31}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{31}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{32}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{32}{}\protected@file@percent } \@setckpt{Chapter7}{ -\setcounter{page}{32} +\setcounter{page}{33} \setcounter{equation}{0} \setcounter{enumi}{4} \setcounter{enumii}{0} diff --git a/Schrick-Noah_MS-Thesis.aux b/Schrick-Noah_MS-Thesis.aux index 88682ac..48df1bb 100644 --- a/Schrick-Noah_MS-Thesis.aux +++ b/Schrick-Noah_MS-Thesis.aux @@ -32,9 +32,9 @@ \bibcite{cook_rage_2018}{9} \bibcite{cook_scalable_2016}{10} \@writefile{toc}{{\hfill \ }} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{32}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{33}{}\protected@file@percent } \@writefile{toc}{\addvspace {10pt}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{32}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{33}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} \bibcite{CVE-2019-10747}{11} \bibcite{dai_fpgp_2016}{12} @@ -54,4 +54,4 @@ \bibcite{zhang_boosting_2017}{26} \bibstyle{plain} \@input{Appendices.aux} -\gdef \@abspage@last{46} +\gdef \@abspage@last{47} diff --git a/Schrick-Noah_MS-Thesis.lof b/Schrick-Noah_MS-Thesis.lof index 1c3cae8..5bbfb3b 100644 --- a/Schrick-Noah_MS-Thesis.lof +++ b/Schrick-Noah_MS-Thesis.lof @@ -4,5 +4,5 @@ \contentsline {figure}{\numberline {4.1}{\ignorespaces A network without Synchronous Firing generating infeasible states}}{18}{}% \contentsline {figure}{\numberline {4.2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program}}{21}{}% \contentsline {figure}{\numberline {4.3}{\ignorespaces Synchronous Firing in the Graph Generation Process}}{23}{}% -\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{26}{}% -\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{27}{}% +\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{27}{}% +\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{28}{}% diff --git a/Schrick-Noah_MS-Thesis.log b/Schrick-Noah_MS-Thesis.log index 9f8635a..1a2dd5c 100644 --- a/Schrick-Noah_MS-Thesis.log +++ b/Schrick-Noah_MS-Thesis.log @@ -1,4 +1,4 @@ -This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 17 MAR 2022 15:54 +This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 17 MAR 2022 18:17 entering extended mode restricted \write18 enabled. %&-line parsing enabled. @@ -267,62 +267,62 @@ File: ./Chapter4_img/Sync-Fire.png Graphic file (type png) Package pdftex.def Info: ./Chapter4_img/Sync-Fire.png used on input line 85. (pdftex.def) Requested size: 244.9144pt x 526.46559pt. -) [22] [23 <./Chapter4_img/Sync-Fire.png>] + [22] [23 <./Chapter4_img/Sync-Fire.png>]) [24] \openout2 = `Chapter5.aux'. (./Chapter5.tex CHAPTER 5. -[24 +[25 ] -<./Chapter5_img/RAGE_Chart.png, id=126, 495.8525pt x 557.08125pt> +<./Chapter5_img/RAGE_Chart.png, id=129, 495.8525pt x 557.08125pt> File: ./Chapter5_img/RAGE_Chart.png Graphic file (type png) Package pdftex.def Info: ./Chapter5_img/RAGE_Chart.png used on input line 43. (pdftex.def) Requested size: 469.75499pt x 527.76213pt. -<./Chapter5_img/horiz_task.drawio.png, id=127, 1125.20375pt x 738.76pt> +<./Chapter5_img/horiz_task.drawio.png, id=130, 1125.20375pt x 738.76pt> File: ./Chapter5_img/horiz_task.drawio.png Graphic file (type png) Package pdftex.def Info: ./Chapter5_img/horiz_task.drawio.png used on input li ne 49. (pdftex.def) Requested size: 469.75499pt x 308.4171pt. - [25] [26 <./Chapter5_img/RAGE_Chart.png>] [27 <./Chapter5_img/horiz_task.drawi -o.png>]) [28] + [26] [27 <./Chapter5_img/RAGE_Chart.png>] [28 <./Chapter5_img/horiz_task.drawi +o.png>]) [29] \openout2 = `Chapter6.aux'. (./Chapter6.tex CHAPTER 6. -[29 +[30 -]) [30] +]) [31] \openout2 = `Chapter7.aux'. (./Chapter7.tex CHAPTER 7. -) [31 +) [32 -] (./Schrick-Noah_MS-Thesis.bbl [32 +] (./Schrick-Noah_MS-Thesis.bbl [33 -] [33]) +] [34]) \c@appendixno=\count269 - [34] + [35] \openout2 = `Appendices.aux'. - (./Appendices.tex [35 + (./Appendices.tex [36 ]) -[36] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) +[37] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux) (./Appendices.aux)) ) (\end occurred inside a group at level 6) @@ -350,10 +350,10 @@ ts/type1/public/amsfonts/cm/cmr12.pfb> -Output written on Schrick-Noah_MS-Thesis.pdf (46 pages, 474895 bytes). +Output written on Schrick-Noah_MS-Thesis.pdf (47 pages, 477063 bytes). PDF statistics: - 206 PDF objects out of 1000 (max. 8388607) - 130 compressed objects within 2 object streams + 209 PDF objects out of 1000 (max. 8388607) + 132 compressed objects within 2 object streams 0 named destinations out of 1000 (max. 500000) 36 words of extra memory for PDF output out of 10000 (max. 10000000) diff --git a/Schrick-Noah_MS-Thesis.pdf b/Schrick-Noah_MS-Thesis.pdf index ec2d35ae5b0780d2322bef6c99d6467826561f2b..ab280dd631f9629735f38a670356cb69564ddce6 100644 GIT binary patch delta 10850 zcmaiZRZtz!4lQ;#xNC8DI5-rFI~3RA?(TYUm*U0UiaQi{cPQ@e?)G}`eKYU#{p?Ay zGTE8zOxB)B+y`M;98t}8R7mdBfK^D^dN1&yhfUkFHl}q&cySzDvuWD6&61+S^6MFKe>GT0M^+n7c zLg6(1m%oe}uAa+Dam)(n-RD}a_Z|)pFjI44@pitT{SjB!@^smkz0o?-Yx&ftuXoKP z4@S_<`jk3|laq<&bCt(SMFV1F$!M|4`tEhq8AIIyu*ccRIWoTc9lutW9RcgD< zD7KE5LV*-`Xq21ayrx8vCeLDw)_t*Vcuw>v?{}ql6Db1fTOv7$5WHbcF`~BwP3RK4 zjGyx*yFBpqBXU7cScTg>U*(6GB{ZdZe@2>9*T#5a#mWRg{u!IV0M&RxJ(yey=>jfR zrYe57dK8N$@s-vt52gx5FcUmHCjGEagiyhK{Vi8Itr5tj42e6P#?bf!M5$bFX~B-KC~+;K9rv*i75zPtBHok13NZC zjxUJs)|-V1`QI5q~5oUc}^m=nF#_q}O&r9*Yu8pLs)p372DG@eglI3Xnj#_uJLL0p# zjc1D~0pnkm)Y)W8{iOjs9{PJ15P5X+;_U69O~N2FnDpvb6|^pk@NO zA1IW#+InG@>)~+Ca>A?D6stjPT_NxudA?YT22da;Aj z6`?Jo_afnj?(9QnXq^9k)MpoX?z1c9elm1L(f-R;`j^wV-WkOp~>>C2f0YT7I zo)eIsy+(^ZZ+trFojCNQygt_bfh6ZoyF=nS7A+)uq9GI=_&inHeg%Z(zxm2=^NYX# zetmKSDmcCp8b)}PBMw991tj98y!emI-)VGPiBcEJ6T6fLxY~yARX}Mywv5O+4I-}J7%8a>$V%~f^ zFy)apX?`#Rwh|M(bqH^nVi>eQthfK9_4M^rwO%!%G-(E2PDgEIIl71QB3srpp=@ zGQN&j!SOO}b9%2IOjzJO{1Gis?^q&Jo&naK-a5pML+$nIxXcrUvu;z00V07EGV-z zn=QB_=eQw^*=}@0rHqm#qp9V}{bIOFebzzr^ge0sFLo!6bhPYjJ!VBy_U0#e)YPjW z0rKlGFo;i_pvH4W2y5u;0nrnxbQV>4BtmV2o!3Q>@h#PfLL#F}JHF;4lq#W0iHN`9 z<`_aS+Yv!XIR{@q(@ueus4zooRucVo(T-omV{-ZvT^`m63)$xe#ZNakMTO2xxTHy} zmT9At5>gw8=9L)3l%DT_kzw;Mopd*0<=46ixaCyxaEm;*D&iTt<73O<*(Alu9rkLG z`rliTELF_X^*90H8I^-tH@5GG(1%H6P>VbHx-@v1+)_Gu`&zMy4vG-8%lj~@`B5;> z$;Fm_&-CF{9}tc{=lk{NxCoHo?{OI*w2ng!2beNN8xYCR1ie_<@AZXHTU0evyB$h( zO>fgolh;dY_E2gD`o=I-E0%H4pxH(S_paqPPyOv)QCfQV9=(ohkaPi_xt_!hEwfCu zp11y6T$CwMF#P1(>*&f_HO_6x&@$W85AcXw~?)D7(v;!>g*EgUO&l>L(oL{PfX z1D_KF_1duPTpLo*5FAoeoE{K0OG;^ZB01Q9-6;1XMdKrgy_9r`g|EtprC(Zg5L$XE z-i3jn4C1|#tpBQx7%x9I*L;OzYlGER`rC4tsyCdx<=EdX8Av`s$7RKdB8#9J#z^a3 zIkqzjepn8oc?W3xNLCmyO_lpiF45Yhk*S8e41%WxnWiJ>be$==kbnxT0m+V0pT$@g zr@U0#vObGL})_>RsDF89fSoXbhlMFtR%)nR07opn|% z^nLIp9_jswYvgylsBvI=*(^lmT}O%RyBe;_r3ngV%z6 z|1t{m5?LIbfpamY`tOyNCD_~}er17gF$i@n?HF>u40%{FBqesFh4WjwGWE|_Ow<+p zAZBxWq7%u;F@x9%!q^EQo7oAVWJY0FIXO80`?&yDYG}o+a-sQ6RbLe#^+$@Wd&&l` zlLHcTDK8*7d<__@#8q*0BlIpG7TuY(n#yzG&S^yp)xTpQ`Ke83T>{)QVLZ1ZcCxuLgMcLHEFAD;hpDPG)|Z(n$#3z{VK6!hRh zOf3g9Dg3dNB-F^w~Pf6PFwa_^jBaUCC$4l#XcSQesCnp~|Cw+6@7@~%Z z+x~b84{F8GlXh5WAn+n!!d)@@$%aWSMwD z2=-{>3d*V2@1V&2%~VYj3Ey*N1X~#pHDjYWi72=dpDfd~mmrR;=oV&6aU*u2Dr7X< zc_^~^uS2xBcGK*>r9_SHeN!a{K<|MC4+t>0V~IlzVNR{1G=+7P5iK)e+%;V!c^aW# zDk4o1+(LP1f4=uZkE@I=L~75#41{U<{#?bI8fihYz8<-qQT@v9r<8v1OgC8r185Zg z2zY$+so8P~7?|`3tmZdp8Hc`!$YV6O`N@|qXk2P>u253o#t?Y!P!z%DjUftFC!aL4 zbg*s)*4V(p%z+@?l7Wpx50!%!-%#bYogjMQGkUHt`TMeO?6bSF;U2wPLzWwzC;$qWW-o&3-QZ|tdZO8XlU*RcM+w^+3qQOb~h@rpp`q!6x}p8yyZfm%MAGv=HpV}wlgdx7btzq zUvbb-C5ChQPTY8T0Y>kz9%UNJc(e(!)H=TmO=lxqGx6u9-^{dN+ zyC7i5b1Hvjw{d^JG7bVeFT%^LZG7ID^~W;4z-1vOfPKDe{$SR)d?@0F#k;y}1Hfw~2wb(6;CA0a8$!$ICl z34Pt=4?xK;N>~#Pmny&;6p8;Sf$*bn$b6@rTuS03s4u14+8&nJ>AK2(FB`H814QCY z%>5Qy4CL?Y!AkpNf2DBDeD~z;38A$f$2Lj9G-*+I;bUZ<{= zmVX(fLm3w39Ci$rFIhbV2k%D<%OAUsjNS6ic+SYH@c6{VV0&bVO3L9S_g)Epg!(^B zvq_69O)@+u`&XtX8LOyR!key%{^DS_<&gJn*|EVayFy{Z$b$Lwon{&bnUTI#^FUs0 z@f*;RVD`F6^xxP-d`$54t|TJ;2s*4DI__D@cFz#qRM-W3Qg;Q?x;!r(2YmgWS&ZY! zj})}_;wb(7r{34Z9%6jP_vkT)mm)OQSK8?cD`>Tl*!l5d_lxf0@sFl_)|OEZtKjMb zR9UDTYC|cz^GPqH!ao*;YV>Yoapwjn8Gc!$$2Nb7e;F||i}I)Ozlf!{kYCbkT^;RV zwic@54_ZQE?kk6CQHE4uWp}h_bv@y#95O{FI>KNzPaHw9M?tgk^8Sw|8Z~6?ce&6y z4>j<-^8+*&#uC<6-P)Lb2G=}B_I}9%wWNZI7y)#UQck} zxDU12`-Mk+#{z`C3v3W7WblV}QPSp5)ULc0|Cw`39jvvovAtV{S=A*jIeE3LIZtyR zjOvljpDgAKBDP(;kq~qNuj*!&&+@pV=5uJc?J=D`$(Ty8b2M=#4=XS(wlm&$Term| z=^Rtf%#1A8S--5DG;yqM#tGW@PN0kn2J^1kGcIxG65(rpb(wqaje=FJQ)s_ktzyg&{XZySmN>lO~#qL-n7liO{{_}5FdKFSFG z{Q0Y)hjlinijk;q1qRf`z#{t*#o*txFs#Nq-$u zmQz8WWfc-kqo}EU-TstZW~3CpK)9vQvvE@4BoYhG?7J{lm&nn6da`l4y^@*qg-2mS z)jgAC2aUcP*mZCg9D)|8v&hfq&d=-_8gc-M!T!ssztEj23NHt+tuoo<-{%2V401HP z8%0t`$7i~gUNdXy9`6GbL*ZgMiRIeN(kkU}mYk_avOfG8Q0=gJEDL<{FB`0dgAAp> z55k;u4*JX~9Y))23E1wNDGAg_WXE3lS$J}!CdSWyB|IYtCYWiwCzyhP_g6n`9$z4M zY*|r}vU?J@gz8qwH>{8|mHlQkFa+qYHol(A&6y$S8`IN3L5>yW!iyVh=OlPr4In53-7lWx5p2 zrU|18zdx3>J03{PMNwDPMl;avo}wklI*f&7X%6bWdDG0AxIq=;>PAEdqF|N~q)lWh zqS0WD!`BEu6g!s$^E;plqc@{{$tHtu!zy)Gi}Dy0#d&!Q6i&i~5FTy=VBqHdSz8xb zgb7swH@uV``(~Pl`}Q9SToWSJgib*{PHyu%)zU0OYC#rIFto_+Cc2Tc>IcZ4NtuZd z7_+lyZnfMg=+^Uhbh@3Quc|)`s86RyXeeo^p<5bY+I%*V*8Z%DZ#H|xpZ*Dd#uD;} zk@E%B=qU#gF(V4DV*pBK$tEu@PyaMS!9B;(cW;ysWQ%~@|1KP z_*3#6=}V16w-fR$Vv$O^9uG35juykj6Shleb=(JZb!+TKzi+MRS1#rKn1;uv>z?SH zv^)Agtxon#hn`0(b_tA%o9W9MrB7LXuMPmdmlp#r|768jtX7{yQm1b`FFjtF%84-X z;HqD2E6PYy5e}CFmjnjDNxVJeb?CI@molzPsCXmYdQ}dp6v}z5x3c`}b@C&W>>SQ+H*oGUA_r#AKqMhz08$xqv-gC!)wFw0`_x za^xV!_~;U04581cUXZGO(<_>V&+j}l0y{C9*eFsNXQX2?skc|hNb^eplFJX65zlVu z|BOpWoFghYbkU=8cwfNAdF0A$fa zawOIqu{Qq$TcA^6O#xV`n#KTLu(IF{eVd3jJPvk#ye27*T{^XrG$Aj_&Mp389{Eq1 z@EH9+&WGb3c5}-^!_BoyPB@dSYFa1Q%H^n@|@1 z74L5PuvkY<8JAKiD<;SsN)E=FG(b_{e_})JPQOOGeDTdQ)mHxw+2k0WYFnN>9&XT* z3DfZuV*s6lT=N(+lOnymKW&aPj!wXNwyy|9*_^*q(IwQqETY42qAu^cbg(BnNfn^H zfl$Pt@^{iG*1z}MC)wq7n{dX0-kMgE!8li<}u)74bPxWnt0x@~clyR;C*Vjd6 z8$_w@^PV}f%c>y(-WWDJktThzMM*2Fn6)uxlAAY_r#?BrXI7abBCmoEPCpzRdCpKo z{UKs`R^{9>jZpeb^nYKc)$Cuz@l63d&|?8Bsj8*`CUE@pBV-ve)JQl)C`@YbHAESw zS8suIgQDY33n2{7Wc?q4SWlXR7Xf(W5kMS>eszgleh|g{iL5p5pkS%LD6YVh!&wAX zkhx?mG?;CXL z*7UYT6T}gum^Sc z^r#Uq+EH_64rt{)+`nf}?Nev${*|uK{NFKY_OEQLh`k^*z*a}s&Y;Qg{lzThd8vW0 zUkg%5qM?VIUk1VG)`(@qgQ5(hY#!{A>qk1;SrFm5Yn*fB(AkAG-D`ylB2t)xY$AdYnDiQ1wHT zP774vK%z2`5ii*_7!?(jGBG?odLK|**1Ia%W2WA8i|Py!$4zCjKe(=C(4ni?szy*H zsxZrqCzYeo&{y@#kk??$9+el)9GX-`jqkN8%d563ae1(f%2cY;<0Z<`ar3B_D2F?v z)2D%3x*PC5yb1#8`aP8lO7P$Pjcj0eY?7rxW!_`~x(hI%e&nn`conCFUtOHDa%t;Q z0Rq~(w8hN7R72_@67zIftEnKw@gOHMN2V{;hpoi2&~QniDT^856FrN22XGv8okY4L zyDAlhSg_sT)O6q$@>6^1CM8!Om6ThUxYU~WO-OcZ8wkGE zw2apw)kO0$Nuz5q3cxD1?Lot74Q>?*To`7RvO>lrCsBkCMq5yc!J&$?ugHrQlMPZu zFH?7lkRl6|lpu@AO%X?w(DDdfy4c3IY6~+TKIi234lEpoeweNh2N(s4sfu(A3l6V2 z$wo=W;goah3szd*-@NOe4xAhx4}qiZhoYS6H5ICH$~8`J=cdeQPMsO6%C;Bpb4WG> zdEZ6sF~1<4c#K`*;Q56*nj|jl4khj$I!MG3&z$fMCm)gBRp@1BWw-0;PixD)obgs} zRCMV~x2@+A%ru-@yphcqq@V5;l6fe`sPZ9XxGwDpx1JR40vDLwSN4@w48c*urW!-p zeuVOu4kwJ65O=x(I2Zm+hC(bo=RpEkr8>YLH+Z>WP$!hkFS-7duKp)anS59}k75`f zWVpdDd^O{%0Rxvcq$n^YS^dgk0jtK>M~A=MoEYMOUbHRpM#--R=&u1URk3qc>kEz> zwnH!m>nhW;zaUTm^Q=~nec&Uis4%GWNp`MF{@r7@+*b^J84@Az=XqS$B25N**IQ5y zLvtZZG{ox&Q?19N*d0G(it*wvcLm8sZ!)hv`~tVt@IX9DFFp9#-mZ=s^*s zQ#pp&iOvRFlLW;?fwu>9NGV#T)^_dOdwu)pbDj$qpSt?c9-Ou zRF$}w@-7g-VCFAObbZR-4p^fQQ(!icZ-XxhEh>zn^S-H+&9v!r*|W~6B9sUP6qJ%e z<&Gk;q|={?LD$b;(O$vvF^qX2%Iq|fjOUga%GpK#{S6z8uqP9kw#$@#MMY(Vo@Ue( z-qg(kvJ#^Y7YWpGA5SiEQi)6TtXe!s$~352oq9852WQF;OjNc#SN(X1uI?lVOUbyA zm?LB<|DG}oyP47m`h8j?=I(6moHJYlmz@4{*UBj8NCFF=T-b(R{4+3Z3De1J+Vq5o&~BL$K|ryei?F;jg>ffCJ+6u@Pu z)CCX_yLq1)*bNQE21>lb!fI}#2hu@9vw_%}51D{hP^n7(P?*gpARr1fBv0xyJ5U~m zhn1TxRh9!t@;}Lr1K5JkhQK0W>E!G}%Era}|CpAS_5U($rIwaG0XLf8V)d4BRPVtJ zbwIv9%RuZdPh-}g<i7FBvep$*b;4Evqm##k&+Ww3&+%w-c*8-A z399*6%?r5tXb_!2H^LDIA&j^Oxgsc-p-9*vm;jJSL_sc{I|NT|u;9-t9t@dPlLU9j zvmH1rCY=vvjOUjQr&N~uZqS%iqk~W0_!EXysw=h!E6g88DMA_+l#B?niNNqz_>xa~ z!~w4qiNBNk7YW1;GQ?1XNK6)oRAm4{DNxS9|2l|(>M4T+4yRkzq~l#>r}Y3Q43Pxn zf4%>~iZ-Sj5U`k~wP&bwp$$Sd-4merTisAhYz_~u*MzLE?fN_M*dx5fuZdJ2v^Jj5 z$)wHxkcJZMQ^;4_%TNna>NTz3~X2HRY61i5zN^w|L9Vt{`p${d8-Wk*M#gK$e@m^g<-x#77goRp!?FOONNW@3m=PC6%`xVHlFs^aH_#Oe@heMSU5ACw)dsJte+S z+`ud)Ma2Nna^%$QzP)v_f4qMMhT~~jkqJPG*spkJL827g`ZW8|aYp&~@^t>CAX(?w zLe2E2k^7j-9bLKEvai~hYy*@@Y@`-z*v&TCz2{NooQ;44Lj6>^OK4dH*fTM&o?5zO z6Gug=&#h|GS!%(xw|LCv0@<7HR|um7^NEe#xH{FloM3e%J;CP0+u0v?&c~6FIB1u-&GO;Eao}!q)ohXQqWw7}5KapWmTEN87o!Ylr0R1cONj zpZiKi3yq-tMXUJ*NAui-^T*D_$T{oav6*(})lLr(c?egHfpG~kHUHO6)9G2d%e6x5)2m<-M1uciaH-XB(W(Ziadp8Ff6JO*QT~A<6 z-=D8 zPlWIuM-CT`a%-xU2gZak?~qwUw&)leT4PO&c!3&@z?#PfGj^3o z{?q6j+R0bQmVdDEDqMj0ZQI72|DB*ZZ0I~;&IuEJl}PE+27F1eGHgl47p{q@R2LC0 z2t6|xu{6|>_E)4?_}Fbr1fzP2{*&PdR<0KQ_WRcn86M&&Y&~OW3zlo00e$B8n_C|w z^Q^}>4}zLjks=Z7udSDFPmJpy;pF7-$#80CcWJVe;3hYGgV9_mfTZftd=F-2cBL-x zvacy1%(*m>2}~gE-T81ePPtu7wY}A^uWrO-Y@1{2&q^%%#r3u{Lvo$}Au0jeHZ0L#=1#D7TsjOs|%h{rW6XgoZk$kjhV3_8xkQ5Jec$5q4bCOqk zJh4XHCnwy}go;d|)@2&r+pwtpj1q!Ez7ZQ-`68_017#V1F zIz(t*H#9T0E(j%9WWM?Io0>46dVKESH#h&xNn4IIKM+DP!^csLaA|3c`t8)Rg^7A_ zUwcRh-y`zaK$XEN(pz(-Vk=FiqW;HV4jSfE5snaK~)8AM7z8GA0T zUrB|JO3N=c1+aS7%kOnZe!;$#Ca%bruJ!LX;57at5LX+H)%%5GHu zR2tj~KbB^V2PRA~uO9MtaFl^QPi2}4O;Ctx>FCBbl*rwOKF}!#jrIhV)Ze=oWltIt za13h4w!Z7B+4ETjao-CZt$*h0Wj6G+@s{FiMe~iIc(}hVF!(>3D`oHvGkXZ$&9unZ z5o}z#!+!o~^wKp!eLEe&{8mWtaSqNl7+XUYrTx%Bd>z(%VrRkj9`Sps$NZu-?BRb$ zHt#pK#Z1{1B)Uhs*3UlR=Y)4L+OmVr2EmnQFRP8gJN!zoHK?8t`1y`INJ zGXmej*BDt~0&^i;vSaClV8^9>jf79JyT`~olz|-YQEhf5O!;(#LA+K#cCY5s5=Ze{ z1TG9ml{Z*2QGp`*>JC#4J@_z6RUG|;vw$8DeuSL%nY`1&oEnJ?Fm xH@Ed`E@$z?KrjoblFTTYr9Gm0+m|yzmrzH_)B^z^F(TK0+M0?=TtNci{{Th@d>#M* delta 8719 zcmaiYRZtwj5-qU6;;z9ZxWmHY?(R--clX5-oM2&bCj@u5;4Z-}xVr`m@N(~cRqylt zO!blO>YDkOo{9WQ_VtalRv8l-x(~!)%bvB5`q>M)~3mpoR|-L&W>;;y^Pnq0>Tx83i(1x zy_A*2O3G2$1-#~DoYI54ed)~n;p4(=^}KlA{+zJB%jz5beK1qKT({ij`Mb?t^GHDd z8B#q3p}m!*`#6*%Kp&?V1&E&d=qjD7xOjkVUr{)x?~vf%KGti1l}xNpc6M43YQ+1) zY*;;?a~_!9hlR4Vd?LVu|q*&VHU_GR*eQ z({e0!iLnM@2ytv&vu;84@-8L{MfKr99#R>G%S(6v83vfS7c}>Glt<6X5Y6|S6K>0; zbcRWg2E}*;EYPn{ZB3qPO-M6(-JN+MG{S223Z69!$81ezsFAx5x#WvFJ0 zvfRm>TXw{X<#+Kwlv!6&vQi5|n#y8Qxk2ufo zq<}(ZpQ)mXgdKh@tFZBK84apkt&uAOu5F)vNk3}r;ay2-Kvjwyt|+9zj2M^WZO0yv zUJ*NFg}bY*4eW)xdwmb>v3Jd;j$F(a_(ohKt6}Px^~{CY+&jxiK@h77uv=R z5vX#Q%hJ2AuT83!&rc?k_9)_dcTX}}IAZpbf z^0@$6B{*Yf!poOtKe`1@eQn-h=Xg86r)=UeK$8UFnIPv-!<1PLypYW&{2)h)%t_%g zmwmb;6tq&W!^~Qp;+_L z7nG?{4hIZliF7JFULtKcoKl_Bzp}D;QUADDqqt#%m)8mW6k6q*ZvyFR*K#&l(>8at z+tagTDN;@72603}1gew0TYjXVWC{~e5Ja+OWR z#83imL|Lb!_j~M>)|i51drVmUy1MmOO$=eCbw8n(ZzVbta5PK<+NL7R=k^2uz0o@= zQTWnFnt`cGhMrWaii*XP$@qSZ zP9L4B^kb(?&r&Pd*Y?+qksqKlkn#+zeQjoL9>h(o z=8yluFJ|a!m54lfurx76k3{X>`L%fsB8&#i`3e(#R6#V8a=4hVV50FkT)blGESMt< z`8+ICTBSM5be@rP_5wpzeLMYzwRuMw1rovTg$lBa(D%Y);wr>AiDJrcCrgZodBhYc zB4};(gQuLt9)cDL^-HBG5%ryjJ>OdtQxJfHaa8A?bUhNMlt~Dk9TZkCbKokh43tJH2$Iq zakArkH?M_leW6BxT*;q4G>f5$fZL&5os@@<-^nG^#gYD$$4AP47zE#P;mC5bcG{l@ zU5m1%X=BlWZ!Z-cJbH{K^2lw*w;b+!QLzV&Rpf3MrWyBWu~8)AZXgp7BqcZppW6Pz z5c9l+0IHT+?Fv(~mHM>s*jY+iyA#==f$JtE13cZgaPBCaGeR=mI>H@VrkzmQGr4x{ zrrD6UMJ#h)eM~e?*%|H%2iHqq2YKO@$k_lS75)CDEhglQyohpr=2XY9+Wfm!a0=QB z(pOkzAZT6evpZU^Jfu<3%a&~Y(%nke$3Wi8mQoKzc&2`zOH5=5(UbzmyqV=Wd_n|EXVmJ2ZD&F`aYFTJw55%@<;cSKHy#@JkQ+dfW zZfozuE=xSl(g8QZhk|=*A%`;c^hDDFkhNR&O03|?fsyx#)q+v!uG=&GyU>w8ld`X zSRR|cD_IMDCM(%VnwNna{R+EwVvo8w0ikYKh7X6EIc-AR0Iot|Yftv4^Hob7X2ES~! zCLX__mu^9vw$Ae&T+DEY0FYMJn14vZ8x?Y)$Tg8BbIawCrYby_)k1z8PtKHG<9(hK zu~6r1^01EK(_g9G7$B)lPnz%gFi)FfFaPbaY$ZRT*brzV-^n-@_c~jRx;R%0kz97> z3eR9AelHfvyQ_u3H^CKmV^u(+jLA$An!y z&=QxCkC30J6NEYK8gSrZVOrEcFktPemi}DReaqBni}?&y60GduC1S8N6&X=_3KLJT zsPVb!()G;m9@?;#jm#Tq5n?-nugpg=dA1p?ycE|)YQE_;$BR7_Yp3-RB@QHZAzlsO zI9{AJyqE`_7Jux0_+nq@8rI+vrN&1^3hqV+q6w_uZqMJLx%Nu#YL>1*+}rf`Nt9sv z=m3GB^?_}wn?#(x7ZZfgTAgHpAAm1}{@xNFj$rs1aq?|eaigbZpg&xRQ1Xtks(qQT z(rU$xfTAaZ3tt_TX=2ehyl=ZvePJKC#Hfnh3dJ`W9j242Ea?Iwcd28p$P1M+KEDkI zOYTlRMizj=ZkvXUx4ZfvEPFy0qHaeCuH~!;Eahim-c4>;i8p5a#RVu$wHdCEN*gwLa)_#a#`K~ls|AwHP^%6(gJ)S>h(Hnbx^&kl#i(K z0HUc5VmQ$no0&3-QDW~g%RT~y#G_+S#}oQ?p;A59*Da?MnLXXJ?AWlbK>2kay|S=Z zHMS`*9?DzBXboxYtYhfa_p|l>H~O@LOe>E9`4p}W+6-4pg}J+!A96`YN5~RZ7wpll z$E=8l4vTA>vQ#Go5r^9FiUNxDGprK%r~Tu9wnd2zFH>9UPT^!@0U#beXh9b&V@p&Z z;4cDN>ej~O>&d~V-&+Wuph;l>yp*Iv+?Libz&CibJ-L8~Hvb3qK(7PT|7Z-*&`7`< zisR05Ujw0V9sgO18$2E?Z;FU6M@vN%V5T1G7zx0GeiekjN5#$)cB2?%2gk{g|JTL$ z9~bo41_7LQ1d9g84UYUE4BzrW7$Jx0ANX&He_|^D+G>M<2CZ^H5QnTkCdsbguPW63 zz=|J$t8<;>iB{Mdk;lrLZpFY4)sk@hJDVeDGvtvqaX>;&Gjv3a1Xf6hdg6>}&F7RH zh3(pk7$B|qBPG;J(^<#&n`B2m)MdosCM0lAKJN>4_B`}5Vi*kQ@_c@hVd*}+rJNy_ znxf1PL)qcne7Lr-PJpaxm8-~a84|*-Jr}w0>CLKml~k|w`WeY@^%GBQM~}06ATP!N zeU~mhiZTl;J!<3OIvqb0X)D0@57HhDy1+9tl9*nePU+D(K_&AHIAqt4&Dg)-P`2Uk z+q@#cO%d$u6wI2J_w&+IxU(Ur-lREbdQ0!K=;#|BG*y`XZL$y*3@WXN`AL88l~Ep= z7U{c09CE45dp#<-ck72XF)Cv-^w|j(xmDO#!1DZlnZEQ_PFCW%?#O+TL7B?Ab{4u{ zFz~P0_dSS>{kp`I#h7J82xYNQOpfr^D(_|$>pZcfU$Os=1{a#|fPfG6aYEn&tO343 z>zoi+A-`rGV9U_qMt{J3frqAE!<2#i`-dDlfiRY((>St4d0`|16sL z=H!S?Z_!5_EO$}##K7xzylYE7DR;CzyzjY^hy|~O6iqrk^V1PGb^nQ`d(9>IYsg+~Z!ak@wikbqDWF2d`Cr5C>H?Ms~Iqn<|%h<8L*8 zyy%;qz39t=opj6nXpYNASXy2b03Iu7-y*fbsu0Y$!BGoaBo)M`KL6c5b0-8mD3c2U z8$=MbPYerwOQgqqykmzqAfQcF0Rdnz=4Fn}5h_N$HP{DnnHR(R{?|G^XyRrpH6N6= z$TdJ9#Lh{?GeBY#(GS<8l^G?Kx)DP+sX?r`18$xR`f=#|VIPzmB8DF^)mk;;aLq!v zSu87BDtf|auhX95IH>n9Js;#~;`Z1zOhBqeNS;a~V>5mkR?squ!5IMS>BLzCy>|WA zAfd~@1>Y567UgfQwepAvwl=@v{}kANatpB=0x}{RFx%Vi1H~M0B;SnU3-Oj(3=W-=K{DsVtCx7QHVBc_@#9 zUJL6$aRPdj|0z;m5O7-`GS7HlDVWocuh{ z&^1^_$hpCIf*~Ky?^EUzR9XUkOdO8-S^%(th_<#1$<%lI7#k58tL2w7aCGw!?^648 zwQ<<~xH(6fz+BU^?qt4fN7B(+VL*#S+kA8{6&06zpJ^aEhPf^osW^h?naS>sKjV~+ z+pjtmSKB!iJu|Leqv9LN5Uu7II?6&B-i}cOM1hVCi}g#-#*d#7U>B4c0!yHZDknA^%+Kv^yHL?*F`yQD{mTvXGgCh4r5cT&-E}V1;%DeI3a!UA=Xot zM?TD!piY%5)I?YuI>j)~X|2{}#BxOySH0^Ne3YXS35@C()B=NfuJjNG4g;z~)5lBiqzvmj?$!mkptxE)sSs>I{4I-_niKL+Y7i!|XImrsA-Qk# za*{Xh)g+EAUif;%6=i!`5(6m@LB0h%WI-Wz53UzyC1NDQe-Bq8^gB9D?E$t^qA3WA zx_A+e%G@3u)(n0jMLIUwBOxtHDItx3pNJKovmyzE6cb?`YkM!$$ACJC)Er>@MdRU$ z%&g|4G(t*#2rXi(J%Ro(l8PFTIvyc^=7rtE-0Ax{UkCjX#Krl+ z#d%Y`H^RSpMR={JBN*b*1c_W(AbIP0zhtkW`1CH$j{5;^`#SBD6USe~-I4ZrpG~hp z)q*&3;lkgViEO_lk5*niJ%a87A&Tr~cQ2)l0d?=YX(nWdK{(1UMDY+s9*$d1emi`j zAJifH)Q-HSDK29RSORa~>&7L|AU6he{h845f&}STu56L5`4m^U8C?VeUzk-LfIrX~ z`PnG{hI1x)3D%!2pK3t5hmleqkl!9Wm4oWMoD}h%hAZ&}Ur)s_bnudsY6`woGODB+ z(YbeL@Fg8%TgQarsBP;DR)r9JtRCh(rWdL1X+Z+OrDFh=#9LhP6zs|d$q!WzAd^)~X3m3K+k)SDFNQB_y%jxP zE}kw1Cr|knMC~5-o-STqFMEv6^IorrQnH<0HZD~~LBXvtc=q)}OgInL{Uvhx zqB6|cq5SbaICf3ZB)SuGUNbg)nI3MpzKp}Alg7F1p;ME|t!#}D?b(RaqwuQ3{&K%$ zzk$_@&-b|8F9W}gck|FIIC6)hGsZVluajje?_s$DDkt7uj4FYd8yA{4vyX!3HCMJPhO4!7gd$<02x;ddcG&)^qr^yqs?>QVMrq|JY zdJnrdj)A-7t~-N}h1Z+^#Al+{7cut^TMeAu2JHPU_HQdhpLXvbJHYQlu{^wfFoC7R z&n5MayZrs4`=TGmbVs84*1~$6<8;c<_v@=2*JKhbq7|bJ6bwsZHbrx-3`Z5jk8@kX zbdIP)hkXC`t|{Tub8|~pMHfw1I1*+(zgcJMNng0h+rajb%J5o2Gumy{9s?2noU`Kdw6F? z&u~6iY6!vnlfa6)z3a0ZwXYSd!80tF!xrs$)m8~=%^TALYB${y?$iDtZsA*VSHd85!yBpC zmwWd8jv$60y6f3Hxvi=1@4ih!E0j;+pJ*ac1%+I`GYq0@0Y8vt=#ZaOS7 zGEB%&D=u=`r#Vx{)RF#rpPaCX>CVMXB6QNXB$7rG<{o8oak-hu>rwL{BDKDw{i&0e zr5hrgTJn_@M=|1$(xZ`niPPcwl^!V*#f|mJ;XqQ=<1c-TC!W)bSi}959a`aquNt#G z;}Yft+tq*Gv2!)1J`j$y13#vNZfJD3xZLWm z=)B!N{L&XeR#u~(lePRB#`*&zv(9L6d~*FEpF!K)g*(1>o6vFw>_t==R!1PE!mIRA z@^=9_z#K5wmc2&Ly?nBBZ~tScPEd`Yi)0*m{-t8_ld6hr=YK{ZI6gk;FL*?}7N@TW zm(p;2{Qp6?Ep7`4pV(nJTmAtXU0Ck_kxE90swA+W|A87GL??1M@c+%`N<&oFf&>3I z8?Pnf1ksWlmh*o`Y-FG@5%k}rg4+^G1*8E$Uy*<~EzPvR2RK+zOEo=^8vu2t0^+sY zGXco~&_Y@uehUK|@FxITK@TKodE*2!0-&2r|5zaqa03pC&j!S8VFd#*0RLJM5(KKi zgFrl-&;&ss#s8u@L0~H}2MW84ox6u8B^QYE|BWZS9NZ~X(hQI)J$=nJIjrD^n)Kn{ z3gXkOWlZ0gIKZS-Sduu)c$j?z&AiQ)wEW0V_iIH-m8g+Xj^C=gPd$n%}@)TbpYfp_=e z^xf?k&o1Mx`{REP;d$#kNwPD+OegQw>SgIha=wbEKsLx4qbiY;cFk(&)>U>8L45_N z+Q&+HC{IX{=fH4lk+fv3G>22iUNyb0NmU?9!680~RcL+xA|?>3)>j+NlaHXnav+ zUC~OfFs8PIv-=U^wsESrXac`Dw1z@{Mhd3?#Di;%e8CdktR<|$P46X@cqHuZgG<8_ zM{~pbiJ~KpGo&d;`I+aDKq~QzC}p@~E&gC`g%A8QO2Z1F2qPO;>LWM>15#}h${ zaH6OBQSci%t0VB_lXvL`d}HmCBpmyiT)L4sj?$Yy6w?+cMG0qlEhL*|J>WZ z`YC;eC$BbUMjF5Pc6fobzm~j0J*uD`Sx*$X(8z70!Jab)ozRM>hTs&Be9Mf?ruWV{ z>5>ijM@*#NnB;kU2CgPK-}5=83`R7Z)_EXo{CS}7>DS8Owk$5{MVi`-74O#mGh`qP zQq(d8x4Ot9eaC6VLwau9Bdy8iLKL)0bdf}+TEsbFRGLs8Cq8bHwwmk=Iwbu&59WJq zziaTzSmC`>vR~Waid(dsb6glc3qQTy_Kmat!R2~L~VjtMKF`)s8G%yP!EbCmM*Za9=Z{2gS@ z0l#faOQDg#!x}c(UGBf?^&g*ZwP}v+a#lJ(kTkze z$j*X=ida9>W%Ozwk@Aim(WIJ#FXZbzRVF;+Q(pv|CHD6&g$*Ytu2fU^_)S5ElzhXUNv5jnC+v)w#KlwET5~o(Jkjqo+G8UhO~y4!e1wKL#PNP_}&hBFT82CogBxTDURu>C$jt_u}&q|Sus#OM%Iy_h4!UH6rIb~G6|`0VJcY*q*b z_)11Hz)2I-moOL@H-5%YzOTe+)0W*<`;MaDUVG}d6eHmJ>#7Rf@f2W(Tz{YB`ImwHsd8{qIeA`29j4fyXX4GNM1 zQb9QQj8WJ%?fk7Mxj6Vx*mWrlIVrg*IscIwE-wFWBMu%)4oVFac6n!OmwyQKe~}cW zp^!9)Tb!3)Mp{ZrT0(-CgG+*sn~zHz4CdpL=I4;&kQSl*|68C7Qa~_7(NW2a2yyFD znEO3jeL<(jVzq#;q{JYnnT@rCuknXY(+RJw8VL^$GIA!89krR&uuR`jpJS9<<$wYY zFI)701gOfHh1Of+FsQ@trfc&d?_HGpkd(UtVR|BzXri9=$83fxZbrE~KN2?P!F~N9 zDRO^bOQR)!kt%iV2n{PlU!t(~NO7=)7LbO$gilPH)n!GCoA$d>oV*B8zxMBDyUyC- z&lm!{CR##*fC4?S8?!<580lgxom?#=ar4@f)aGd$7CJXQ$&@r&IpoSVDK~t5WQU;d z%=Ji@B2|K{G$pmwwpX9fTaIE-G%!vXHI0;+%wCID^I>=&jKV>XVw68m3FaVu)R%6s zv8=sm!vns{GNIEV0PpAaIn!@%s-K^AyP?y7nHKoi@ z3NpmYomPLtQ3Bsxm++1Anvf;a$aq z&W*-yqANfjx=P=WyWX6j60q3w_LQ&=DJ^h&D3=K%Nz#?@yVnZN#U8_Y{NU0Hm|t9DkCtCr#X~d*wWty;IK{;^#ZN#R$yJk6n|!^eqg)~i?M)qD zW^Xo;DRM+uIMowA>6lkrB=D%Er08mQp?4};OYB%rY_LD1{3|R-70w=lI1icK0dEr~ mvQZ&Fj`s96?l-*xvG&~ZpeC|Fa#S7;9xjxRAEi}gQ2q~kxmA<^ diff --git a/Schrick-Noah_MS-Thesis.toc b/Schrick-Noah_MS-Thesis.toc index 7f970f1..a61760d 100644 --- a/Schrick-Noah_MS-Thesis.toc +++ b/Schrick-Noah_MS-Thesis.toc @@ -40,57 +40,57 @@ \contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{21}{}% \contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{22}{}% \contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{22}{}% -\contentsline {subsection}{\numberline {4.3.2}\it Results}{22}{}% -\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{24}{}% -\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{24}{}% -\contentsline {section}{\numberline {5.2}\bf Necessary Components}{24}{}% -\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{24}{}% -\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{25}{}% -\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{25}{}% -\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{25}{}% -\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{25}{}% -\contentsline {subsubsection}{Communication Structure}{25}{}% -\contentsline {subsubsection}{Task Zero}{25}{}% -\contentsline {subsubsection}{Task One}{25}{}% -\contentsline {subsubsection}{Task Two}{25}{}% -\contentsline {subsubsection}{Task Three}{25}{}% -\contentsline {subsubsection}{Task Four}{28}{}% -\contentsline {subsubsection}{Task Five}{28}{}% -\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{28}{}% -\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{28}{}% -\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{28}{}% -\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{28}{}% -\contentsline {subsubsection}{Communication Structure}{28}{}% -\contentsline {subsubsection}{Worker Nodes}{28}{}% -\contentsline {subsubsection}{Root Node}{28}{}% -\contentsline {subsubsection}{Database Node}{28}{}% -\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{28}{}% -\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{29}{}% -\contentsline {section}{\numberline {6.1}\bf Small Networks}{29}{}% -\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{29}{}% -\contentsline {subsection}{\numberline {6.1.2}\it Results}{29}{}% -\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{29}{}% -\contentsline {section}{\numberline {6.2}\bf Large Networks}{29}{}% -\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{29}{}% -\contentsline {subsection}{\numberline {6.2.2}\it Results}{29}{}% -\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{29}{}% -\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{29}{}% -\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{29}{}% -\contentsline {subsection}{\numberline {6.3.2}\it Results}{29}{}% -\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{29}{}% -\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{29}{}% -\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{30}{}% -\contentsline {subsection}{\numberline {6.4.2}\it Results}{30}{}% -\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{30}{}% -\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{31}{}% -\contentsline {section}{\numberline {7.1}\bf Future Work}{31}{}% +\contentsline {subsection}{\numberline {4.3.2}\it Results}{24}{}% +\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{25}{}% +\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{25}{}% +\contentsline {section}{\numberline {5.2}\bf Necessary Components}{25}{}% +\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{25}{}% +\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{26}{}% +\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{26}{}% +\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{26}{}% +\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{26}{}% +\contentsline {subsubsection}{Communication Structure}{26}{}% +\contentsline {subsubsection}{Task Zero}{26}{}% +\contentsline {subsubsection}{Task One}{26}{}% +\contentsline {subsubsection}{Task Two}{26}{}% +\contentsline {subsubsection}{Task Three}{26}{}% +\contentsline {subsubsection}{Task Four}{29}{}% +\contentsline {subsubsection}{Task Five}{29}{}% +\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{29}{}% +\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{29}{}% +\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{29}{}% +\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{29}{}% +\contentsline {subsubsection}{Communication Structure}{29}{}% +\contentsline {subsubsection}{Worker Nodes}{29}{}% +\contentsline {subsubsection}{Root Node}{29}{}% +\contentsline {subsubsection}{Database Node}{29}{}% +\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{29}{}% +\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{30}{}% +\contentsline {section}{\numberline {6.1}\bf Small Networks}{30}{}% +\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{30}{}% +\contentsline {subsection}{\numberline {6.1.2}\it Results}{30}{}% +\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{30}{}% +\contentsline {section}{\numberline {6.2}\bf Large Networks}{30}{}% +\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{30}{}% +\contentsline {subsection}{\numberline {6.2.2}\it Results}{30}{}% +\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{30}{}% +\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{30}{}% +\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{30}{}% +\contentsline {subsection}{\numberline {6.3.2}\it Results}{30}{}% +\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{30}{}% +\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{30}{}% +\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{31}{}% +\contentsline {subsection}{\numberline {6.4.2}\it Results}{31}{}% +\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{31}{}% +\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{32}{}% +\contentsline {section}{\numberline {7.1}\bf Future Work}{32}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{32}{}% +\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{33}{}% \addvspace {10pt} -\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{32}{}% +\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{33}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{35}{}% -\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{36}{}% -\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{36}{}% -\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{36}{}% -\contentsline {subsubsection}{A Sub-subsection in an Appendix}{36}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{36}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{37}{}% +\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{37}{}% +\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{37}{}% +\contentsline {subsubsection}{A Sub-subsection in an Appendix}{37}{}%