diff --git a/Appendices.aux b/Appendices.aux index bd0d5d2..d7112cf 100644 --- a/Appendices.aux +++ b/Appendices.aux @@ -1,24 +1,19 @@ \relax -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{22}{}\protected@file@percent } -\newlabel{App:A}{{A}{22}} -\@writefile{lot}{\contentsline {table}{\numberline {A.1}{\ignorespaces Title of the Only Table in this Appendix.}}{22}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{23}{}\protected@file@percent } -\newlabel{App:B}{{B}{23}} -\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{23}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{23}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{23}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {B.1}{\ignorespaces Title of the First Table in this Appendix.}}{23}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {B.1}{\ignorespaces Title of the First Figure in this Appendix.}}{24}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {B.2}{\ignorespaces Title of the Second Table in this Appendix.}}{24}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {B.2}{\ignorespaces Title of the Second Figure in this Appendix.}}{24}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}\protected@file@percent } +\newlabel{App:A}{{A}{18}} +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}\protected@file@percent } +\newlabel{App:B}{{B}{19}} +\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}\protected@file@percent } \@setckpt{Appendices}{ -\setcounter{page}{25} +\setcounter{page}{20} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{6} -\setcounter{footnote}{1} +\setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{7} @@ -27,8 +22,8 @@ \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{2} -\setcounter{table}{2} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} \setcounter{appendixno}{2} diff --git a/Appendices.tex b/Appendices.tex index 47a7ffc..008ea63 100644 --- a/Appendices.tex +++ b/Appendices.tex @@ -1,50 +1,7 @@ \TUappendix{THE FIRST APPENDIX} \label{App:A} - -Text in the appendix. Now we will type in a little more text so -that we can see if the paragraph is properly indented. - -\begin{table} -\suppressfloats[t] \centerline{Normally a table would go here.} - \caption{Title of the Only Table in this Appendix.} -\end{table} - - \TUappendix{THE SECOND APPENDIX} \label{App:B} - -Of course this is the material that goes in the second appendix. -What did you expect to find here? - \TUsection{A Heading in an Appendix} - -A recent modification corrects the numbering of sections, -subsections and subsubsection in the appendix. - \TUsubsection{A Subheading in an Appendix} - -The subsection appears to work. - -\TUsubsubsection{A Sub-subsection in an Appendix} And the sub subsection also works. Finally we test that figures -and tables also work. - - -\begin{table} -\suppressfloats[t] \centerline{Normally a table would go here.} - \caption{Title of the First Table in this Appendix.} -\end{table} - -\begin{figure} -\suppressfloats[t] -\centerline{Normally a figure would go here.} - \caption{Title of the First Figure in this Appendix.} -\end{figure} -\begin{table} -\suppressfloats[t] \centerline{Normally a table would go here.} - \caption{Title of the Second Table in this Appendix.} -\end{table} - -\begin{figure} -\suppressfloats[t] \centerline{Normally a figure would go here.} - \caption{Title of the Second Figure in this Appendix.} -\end{figure} +\TUsubsubsection{A Sub-subsection in an Appendix} diff --git a/Chapter1.aux b/Chapter1.aux index f1f931f..86a6dd0 100644 --- a/Chapter1.aux +++ b/Chapter1.aux @@ -1,14 +1,10 @@ \relax \@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf First Heading: The Introduction}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Second Heading}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.1}\it First Subheading}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {1.2.2}\it Second Subheading}{1}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsubsection}{First Sub-subsection Header}{1}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {1.1}{\ignorespaces Title of the First Figure.}}{1}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {1.1}{\ignorespaces Title of the First Table.}}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}\protected@file@percent } \@setckpt{Chapter1}{ -\setcounter{page}{3} +\setcounter{page}{2} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} @@ -18,13 +14,13 @@ \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{1} -\setcounter{section}{2} -\setcounter{subsection}{2} +\setcounter{section}{3} +\setcounter{subsection}{0} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{1} -\setcounter{table}{1} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} } diff --git a/Chapter1.tex b/Chapter1.tex index df78b77..a5e3b7b 100644 --- a/Chapter1.tex +++ b/Chapter1.tex @@ -1,29 +1,7 @@ \TUchapter{INTRODUCTION} -\TUsection{First Heading: The Introduction} -%This is the first section of the introduction. For additional -%information see %\cite{Sham,Scot95} or just for fun you may wish to -%read \cite{Mathematica}. +\TUsection{Introduction to Attack Graphs} -Here is the beginning of a second paragraph. +\TUsection{Application to Cybersecurity and Compliance} + +\TUsection{Objectives and Contributions} -\TUsection{Second Heading} This is the text for the second -section. -\TUsubsection{First Subheading} This is text for the first -subsection. -\TUsubsection{Second Subheading} -This is the text which lies in the second subsection. -\TUsubsubsection{First Sub-subsection Header} This -language lies in the first sub subsection. Since they are the same -font and indentation, the header looks a little bit like the text -itself, so there is a colon and a little extra space after the -sub-subsection heading. This is all taken care of in the TUthesis -style page. Here, we refer to Appendix~\ref{App:A} and Appendix~\ref{App:B} to check that -the references appear as capital letters. -\begin{figure} -\centerline{Normally a figure would go here.} - \caption{Title of the First Figure.} -\end{figure} -\begin{table} -\centerline{Normally a table would go here.} - \caption{Title of the First Table.} -\end{table} diff --git a/Chapter2.aux b/Chapter2.aux index 56359c2..d43f7c8 100644 --- a/Chapter2.aux +++ b/Chapter2.aux @@ -1,28 +1,27 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf First Heading}{3}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Second Heading}{4}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Title of the Second Figure}}{4}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {2.1}{\ignorespaces Title of the Second Table}}{4}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {2.2}{\ignorespaces Title of the Third Table}}{4}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}\protected@file@percent } \@setckpt{Chapter2}{ -\setcounter{page}{5} +\setcounter{page}{3} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} -\setcounter{footnote}{1} +\setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{2} -\setcounter{section}{2} +\setcounter{section}{4} \setcounter{subsection}{0} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{1} -\setcounter{table}{2} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} } diff --git a/Chapter2.tex b/Chapter2.tex index fcafa1a..aab38da 100644 --- a/Chapter2.tex +++ b/Chapter2.tex @@ -1,22 +1,11 @@ \TUchapter{RELATED WORKS} -\TUsection{First Heading} -\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} +\TUsection{Introduction to Graph Generation} -Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. +\TUsection{Improvements to Attack Graph Generation} + +\TUsection{Attack Dependency Graphs} + +\TUsection{Compliance Graphs} -Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. -\TUsection{Second Heading} Second section of the second chapter. -\begin{figure}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Figure} -\end{figure} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Table} -\end{table} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Third Table} -\end{table}\\ diff --git a/Chapter3.aux b/Chapter3.aux index 3280334..a28a841 100644 --- a/Chapter3.aux +++ b/Chapter3.aux @@ -1,13 +1,13 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{5}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{5}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}\protected@file@percent } \citation{cook_rage_2018} -\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{6}{}\protected@file@percent } -\newlabel{fig:PW}{{3.1}{6}} -\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{6}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{7}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{8}{}\protected@file@percent } -\newlabel{fig:CC}{{3.2}{8}} +\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}\protected@file@percent } +\newlabel{fig:PW}{{3.1}{4}} +\@writefile{toc}{\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}\protected@file@percent } +\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}\protected@file@percent } +\newlabel{fig:CC}{{3.2}{6}} \citation{cook_rage_2018} \citation{li_concurrency_2019} \citation{li_combining_2019} @@ -16,13 +16,13 @@ \citation{berry_graph_2007} \citation{cook_rage_2018} \citation{zhang_boosting_2017} -\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{9}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{9}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{10}{}\protected@file@percent } -\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{11}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}\protected@file@percent } \@setckpt{Chapter3}{ -\setcounter{page}{13} +\setcounter{page}{11} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} diff --git a/Chapter4.aux b/Chapter4.aux index 7960c6d..03d8c35 100644 --- a/Chapter4.aux +++ b/Chapter4.aux @@ -1,28 +1,29 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf First Heading}{13}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Second Heading}{14}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces Title of the Second Figure}}{14}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {4.1}{\ignorespaces Title of the Second Table}}{14}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {4.2}{\ignorespaces Title of the Third Table}}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}\protected@file@percent } \@setckpt{Chapter4}{ -\setcounter{page}{15} +\setcounter{page}{12} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} -\setcounter{footnote}{1} +\setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{4} -\setcounter{section}{2} -\setcounter{subsection}{0} +\setcounter{section}{3} +\setcounter{subsection}{2} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{1} -\setcounter{table}{2} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} } diff --git a/Chapter4.tex b/Chapter4.tex index 20324a8..ae61c61 100644 --- a/Chapter4.tex +++ b/Chapter4.tex @@ -1,22 +1,13 @@ \TUchapter{SYNCHRONOUS FIRING} -\TUsection{First Heading} -\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} +\TUsection{Introduction} -Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. +\TUsubsection{Synchronous Firing in Literature} -Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. +\TUsection{Necessary Components} + +\TUsection{Example Networks and Results} +\TUsubsection{Example Networks} + +\TUsubsection{Results} -\TUsection{Second Heading} Second section of the second chapter. -\begin{figure}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Figure} -\end{figure} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Table} -\end{table} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Third Table} -\end{table}\\ diff --git a/Chapter5.aux b/Chapter5.aux index 67ef0b0..0453a42 100644 --- a/Chapter5.aux +++ b/Chapter5.aux @@ -1,28 +1,46 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{15}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Tasking Approach}{15}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Subgraphing Approach}{16}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Title of the Second Figure}}{16}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {5.1}{\ignorespaces Title of the Second Table}}{16}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {5.2}{\ignorespaces Title of the Third Table}}{16}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task One}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Two}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Three}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Four}{12}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Task Five}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Root Node}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsubsection}{Database Node}{13}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}\protected@file@percent } \@setckpt{Chapter5}{ -\setcounter{page}{17} +\setcounter{page}{14} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} -\setcounter{footnote}{1} +\setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{5} -\setcounter{section}{2} -\setcounter{subsection}{0} +\setcounter{section}{4} +\setcounter{subsection}{3} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{1} -\setcounter{table}{2} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} } diff --git a/Chapter5.tex b/Chapter5.tex index 7ce80ce..81219e0 100644 --- a/Chapter5.tex +++ b/Chapter5.tex @@ -1,22 +1,33 @@ \TUchapter{IMPLEMENTATION OF MESSAGE PASSING INTERFACE} +\TUsection{Introduction to MPI Utilization for Attack Graph Generation} + +\TUsection{Necessary Components} +\TUsubsection{Serialization} +\TUsubsection{Data Consistency} + \TUsection{Tasking Approach} -\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} +\TUsubsection{Introduction to the Tasking Approach} -Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. +\TUsubsection{Algorithm Design} +\TUsubsubsection{Communication Structure} +\TUsubsubsection{Task Zero} +\TUsubsubsection{Task One} +\TUsubsubsection{Task Two} +\TUsubsubsection{Task Three} +\TUsubsubsection{Task Four} +\TUsubsubsection{Task Five} -Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. +\TUsubsection{Performance Expectations} + +\TUsection{Subgraphing Approach} +\TUsubsection{Introduction to the Subgraphing Approach} + +\TUsubsection{Algorithm Design} +\TUsubsubsection{Communication Structure} +\TUsubsubsection{Worker Nodes} +\TUsubsubsection{Root Node} +\TUsubsubsection{Database Node} + +\TUsubsection{Performance Expectations} -\TUsection{Subgraphing Approach} Second section of the second chapter. -\begin{figure}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Figure} -\end{figure} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Table} -\end{table} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Third Table} -\end{table}\\ diff --git a/Chapter6.aux b/Chapter6.aux index 55dd40d..6769394 100644 --- a/Chapter6.aux +++ b/Chapter6.aux @@ -1,28 +1,39 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{17}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf First Heading}{17}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Second Heading}{18}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {6.1}{\ignorespaces Title of the Second Figure}}{18}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {6.1}{\ignorespaces Title of the Second Table}}{18}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {6.2}{\ignorespaces Title of the Third Table}}{18}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}\protected@file@percent } +\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}\protected@file@percent } \@setckpt{Chapter6}{ -\setcounter{page}{19} +\setcounter{page}{16} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} -\setcounter{footnote}{1} +\setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{6} -\setcounter{section}{2} -\setcounter{subsection}{0} +\setcounter{section}{4} +\setcounter{subsection}{3} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{1} -\setcounter{table}{2} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} } diff --git a/Chapter6.tex b/Chapter6.tex index f7760f9..6bd164e 100644 --- a/Chapter6.tex +++ b/Chapter6.tex @@ -1,22 +1,21 @@ \TUchapter{PERFORMANCE ANALYSIS} -\TUsection{First Heading} -\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} +\TUsection{Small Networks} +\TUsubsection{Test Information} +\TUsubsection{Results} +\TUsubsection{Analysis} -Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. +\TUsection{Large Networks} +\TUsubsection{Test Information} +\TUsubsection{Results} +\TUsubsection{Analysis} -Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. +\TUsection{Large Exploit Lists} +\TUsubsection{Test Information} +\TUsubsection{Results} +\TUsubsection{Analysis} -\TUsection{Second Heading} Second section of the second chapter. -\begin{figure}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Figure} -\end{figure} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Table} -\end{table} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Third Table} -\end{table}\\ +\TUsection{Distributed Hash Tables} +\TUsubsection{Test Information} +\TUsubsection{Results} +\TUsubsection{Analysis} diff --git a/Chapter7.aux b/Chapter7.aux index 43f8b7c..bc17ef6 100644 --- a/Chapter7.aux +++ b/Chapter7.aux @@ -1,28 +1,24 @@ \relax -\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{19}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf First Heading}{19}{}\protected@file@percent } -\@writefile{toc}{\contentsline {section}{\numberline {7.2}\bf Second Heading}{20}{}\protected@file@percent } -\@writefile{lof}{\contentsline {figure}{\numberline {7.1}{\ignorespaces Title of the Second Figure}}{20}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {7.1}{\ignorespaces Title of the Second Table}}{20}{}\protected@file@percent } -\@writefile{lot}{\contentsline {table}{\numberline {7.2}{\ignorespaces Title of the Third Table}}{20}{}\protected@file@percent } +\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}\protected@file@percent } \@setckpt{Chapter7}{ -\setcounter{page}{21} +\setcounter{page}{17} \setcounter{equation}{0} \setcounter{enumi}{0} \setcounter{enumii}{0} \setcounter{enumiii}{0} \setcounter{enumiv}{0} -\setcounter{footnote}{1} +\setcounter{footnote}{0} \setcounter{mpfootnote}{0} \setcounter{part}{0} \setcounter{chapter}{7} -\setcounter{section}{2} +\setcounter{section}{1} \setcounter{subsection}{0} \setcounter{subsubsection}{0} \setcounter{paragraph}{0} \setcounter{subparagraph}{0} -\setcounter{figure}{1} -\setcounter{table}{2} +\setcounter{figure}{0} +\setcounter{table}{0} \setcounter{lofdepth}{1} \setcounter{lotdepth}{1} } diff --git a/Chapter7.tex b/Chapter7.tex index 0968879..b44a99c 100644 --- a/Chapter7.tex +++ b/Chapter7.tex @@ -1,22 +1,9 @@ \TUchapter{CONCLUSIONS AND FUTURE WORKS} -\TUsection{First Heading} -\par This is the beginning of the second chapter and the first section of the second chapter. The rest of the text in this section is meaningless filler.\footnote{The filler used on this page is of a family called \emph{Lorem Ipsum}. It was generated by http://www.lipsum.com/feed/html on August 18, 2014 at 8:08 pm Central Time. The site explains the history of \emph{Lorem Ipsum} filler, the reason for using it, and a procedure for generating it.} - -Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer luctus feugiat odio et fermentum. Etiam ut vulputate tellus. Aenean sed libero nec nibh gravida consequat eu vel diam. Nullam at accumsan purus. Nullam sit amet nulla et orci dapibus mollis. Etiam placerat, lacus eget venenatis bibendum, metus odio commodo nisi, sed scelerisque nulla odio vel nibh. Mauris vitae elementum turpis. - -Proin eu lectus non odio vestibulum fermentum nec et leo. Integer ut leo velit. Curabitur nec est eget felis accumsan interdum. Duis fermentum turpis id mauris blandit convallis. Morbi risus arcu, ornare eget lectus in, accumsan rutrum mi. Nulla facilisi. Donec iaculis nisl vitae erat luctus, vitae consequat mi condimentum. Duis imperdiet enim sapien, vitae suscipit neque ullamcorper sit amet. Aliquam placerat lorem risus, at tempor lectus placerat egestas. Vestibulum rhoncus, eros ut posuere cursus, mauris nisl egestas tortor, ac dignissim est libero pretium arcu. Fusce mollis lacus est, id vulputate leo ultrices sit amet. Quisque condimentum justo risus, posuere volutpat velit congue tempor. Integer quis nunc at nibh posuere congue ut et diam. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Maecenas id feugiat est, sit amet viverra tortor. - -\TUsection{Second Heading} Second section of the second chapter. -\begin{figure}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Figure} -\end{figure} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Second Table} -\end{table} -\begin{table}[htp] -\vspace{.2truein} \centerline{Normally a figure would go here.} - \caption{Title of the Third Table} -\end{table}\\ +\TUsection{Future Work} +%Blending OpenMP and MPI +%Subgraphing Work + %DHT alts + %depth limit parameter tuning +%Tuning MPI Params +%Testing various MPI implementations (OpenMPI vs MPICH vs MVAPICH) \ No newline at end of file diff --git a/Schrick-Noah_MS-Thesis.aux b/Schrick-Noah_MS-Thesis.aux index e425be3..eaa9e2e 100644 --- a/Schrick-Noah_MS-Thesis.aux +++ b/Schrick-Noah_MS-Thesis.aux @@ -6,13 +6,13 @@ \@writefile{toc}{{\hfill \ }} \@writefile{toc}{\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{vii}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} \@writefile{lot}{{\vspace {\baselineskip }}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{viii}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} \@writefile{lof}{{\vspace {\baselineskip }}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{ix}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}\protected@file@percent } \@input{Chapter1.aux} \@input{Chapter2.aux} \@input{Chapter3.aux} @@ -29,9 +29,9 @@ \bibcite{zhang_boosting_2017}{6} \bibstyle{plain} \@writefile{toc}{{\hfill \ }} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}\protected@file@percent } \@writefile{toc}{\addvspace {10pt}} -\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}\protected@file@percent } +\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}\protected@file@percent } \@writefile{toc}{{\hfill \ }} \@input{Appendices.aux} -\gdef \@abspage@last{33} +\gdef \@abspage@last{29} diff --git a/Schrick-Noah_MS-Thesis.lof b/Schrick-Noah_MS-Thesis.lof index 88aecef..43c857f 100644 --- a/Schrick-Noah_MS-Thesis.lof +++ b/Schrick-Noah_MS-Thesis.lof @@ -1,11 +1,3 @@ {\vspace {\baselineskip }} -\contentsline {figure}{\numberline {1.1}{\ignorespaces Title of the First Figure.}}{1}{}% -\contentsline {figure}{\numberline {2.1}{\ignorespaces Title of the Second Figure}}{4}{}% -\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{6}{}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{8}{}% -\contentsline {figure}{\numberline {4.1}{\ignorespaces Title of the Second Figure}}{14}{}% -\contentsline {figure}{\numberline {5.1}{\ignorespaces Title of the Second Figure}}{16}{}% -\contentsline {figure}{\numberline {6.1}{\ignorespaces Title of the Second Figure}}{18}{}% -\contentsline {figure}{\numberline {7.1}{\ignorespaces Title of the Second Figure}}{20}{}% -\contentsline {figure}{\numberline {B.1}{\ignorespaces Title of the First Figure in this Appendix.}}{24}{}% -\contentsline {figure}{\numberline {B.2}{\ignorespaces Title of the Second Figure in this Appendix.}}{24}{}% +\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{4}{}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{6}{}% diff --git a/Schrick-Noah_MS-Thesis.log b/Schrick-Noah_MS-Thesis.log index 90f081f..9d95dc5 100644 --- a/Schrick-Noah_MS-Thesis.log +++ b/Schrick-Noah_MS-Thesis.log @@ -1,4 +1,4 @@ -This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 15:10 +This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 25 FEB 2022 16:46 entering extended mode restricted \write18 enabled. %&-line parsing enabled. @@ -176,22 +176,22 @@ Overfull \hbox (1.75291pt too wide) in paragraph at lines 22--22 [6 -]) +] [7]) \tf@toc=\write3 \openout3 = `Schrick-Noah_MS-Thesis.toc'. - [7] (./Schrick-Noah_MS-Thesis.lot) + [8] (./Schrick-Noah_MS-Thesis.lot) \tf@lot=\write4 \openout4 = `Schrick-Noah_MS-Thesis.lot'. - [8 + [9 ] (./Schrick-Noah_MS-Thesis.lof) \tf@lof=\write5 \openout5 = `Schrick-Noah_MS-Thesis.lof'. -[9 +[10 ] \openout2 = `Chapter1.aux'. @@ -202,152 +202,93 @@ CHAPTER 1. -] [2] +] \openout2 = `Chapter2.aux'. (./Chapter2.tex CHAPTER 2. -LaTeX Font Info: External font `cmex10' loaded for size -(Font) <7> on input line 4. -LaTeX Font Info: External font `cmex10' loaded for size -(Font) <5> on input line 4. +) [2 -Underfull \hbox (badness 2662) in paragraph at lines 4--4 -[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm -r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by - [] -) -Underfull \hbox (badness 10000) in paragraph at lines 10--205 - [] +] +\openout2 = `Chapter3.aux'. + + (./Chapter3.tex +CHAPTER 3. +<./Chapter3_img/PW.png, id=44, 958.58125pt x 525.965pt> +File: ./Chapter3_img/PW.png Graphic file (type png) + +Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17. +(pdftex.def) Requested size: 469.75499pt x 257.74918pt. [3 -] [4] -\openout2 = `Chapter3.aux'. - - (./Chapter3.tex -CHAPTER 3. -<./Chapter3_img/PW.png, id=52, 958.58125pt x 525.965pt> -File: ./Chapter3_img/PW.png Graphic file (type png) - -Package pdftex.def Info: ./Chapter3_img/PW.png used on input line 17. -(pdftex.def) Requested size: 469.75499pt x 257.74918pt. -[5 - - - - -] [6 <./Chapter3_img/PW.png>] -<./Chapter3_img/CC.png, id=61, 658.46pt x 527.9725pt> +] [4 <./Chapter3_img/PW.png>] +<./Chapter3_img/CC.png, id=54, 658.46pt x 527.9725pt> File: ./Chapter3_img/CC.png Graphic file (type png) Package pdftex.def Info: ./Chapter3_img/CC.png used on input line 55. (pdftex.def) Requested size: 469.75499pt x 376.66768pt. - [7] [8 <./Chapter3_img/CC.png>] [9] [10] -[11]) [12] + [5] [6 <./Chapter3_img/CC.png>] [7] [8] +[9]) [10] \openout2 = `Chapter4.aux'. (./Chapter4.tex CHAPTER 4. - -Underfull \hbox (badness 2662) in paragraph at lines 4--4 -[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm -r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by - [] - -) -Underfull \hbox (badness 10000) in paragraph at lines 10--207 - - [] - -[13 +) [11 -] [14] +] \openout2 = `Chapter5.aux'. (./Chapter5.tex CHAPTER 5. - -Underfull \hbox (badness 2662) in paragraph at lines 4--4 -[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm -r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by - [] - -) -Underfull \hbox (badness 10000) in paragraph at lines 10--208 - - [] - -[15 +[12 -] [16] +]) [13] \openout2 = `Chapter6.aux'. (./Chapter6.tex CHAPTER 6. - -Underfull \hbox (badness 2662) in paragraph at lines 4--4 -[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm -r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by - [] - -) -Underfull \hbox (badness 10000) in paragraph at lines 10--209 - - [] - -[17 +[14 -] [18] +]) [15] \openout2 = `Chapter7.aux'. (./Chapter7.tex CHAPTER 7. - -Underfull \hbox (badness 2662) in paragraph at lines 4--4 -[][]\OT1/cmr/m/n/10 The filler used on this page is of a fam-ily called \OT1/cm -r/m/it/10 Lorem Ip-sum\OT1/cmr/m/n/10 . It was gen-er-ated by - [] - -) -Underfull \hbox (badness 10000) in paragraph at lines 10--210 - - [] - -[19 +) [16 -] [20] (./Schrick-Noah_MS-Thesis.bbl) +] (./Schrick-Noah_MS-Thesis.bbl) \c@appendixno=\count269 - [21 + [17 ] \openout2 = `Appendices.aux'. - (./Appendices.tex [22 + (./Appendices.tex [18 -]) [23] -[24] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) -(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) -(./Chapter7.aux) (./Appendices.aux)) ) +]) [19] +(./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux) (./Chapter3.aux +) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux) (./Chapter7.aux) +(./Appendices.aux)) ) (\end occurred inside a group at level 6) ### semi simple group (level 6) entered at line 198 (\begingroup) @@ -358,27 +299,23 @@ Underfull \hbox (badness 10000) in paragraph at lines 10--210 ### semi simple group (level 1) entered at line 52 (\begingroup) ### bottom level Here is how much of TeX's memory you used: - 2125 strings out of 478353 - 37243 string characters out of 5854635 - 339865 words of memory out of 5000000 - 20197 multiletter control sequences out of 15000+600000 - 407503 words of font info for 40 fonts, out of 8000000 for 9000 + 2121 strings out of 478353 + 37194 string characters out of 5854635 + 344865 words of memory out of 5000000 + 20194 multiletter control sequences out of 15000+600000 + 407157 words of font info for 39 fonts, out of 8000000 for 9000 1141 hyphenation exceptions out of 8191 - 55i,8n,62p,960b,1269s stack positions out of 5000i,500n,10000p,200000b,80000s + 55i,7n,62p,310b,1268s stack positions out of 5000i,500n,10000p,200000b,80000s {/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en c} -Output written on Schrick-Noah_MS-Thesis.pdf (33 pages, 251664 bytes). +ts/type1/public/amsfonts/cm/cmr12.pfb> +Output written on Schrick-Noah_MS-Thesis.pdf (29 pages, 200518 bytes). PDF statistics: - 164 PDF objects out of 1000 (max. 8388607) - 105 compressed objects within 2 object streams + 130 PDF objects out of 1000 (max. 8388607) + 84 compressed objects within 1 object stream 0 named destinations out of 1000 (max. 500000) 11 words of extra memory for PDF output out of 10000 (max. 10000000) diff --git a/Schrick-Noah_MS-Thesis.lot b/Schrick-Noah_MS-Thesis.lot index cd1dbf6..482eb51 100644 --- a/Schrick-Noah_MS-Thesis.lot +++ b/Schrick-Noah_MS-Thesis.lot @@ -1,15 +1 @@ {\vspace {\baselineskip }} -\contentsline {table}{\numberline {1.1}{\ignorespaces Title of the First Table.}}{2}{}% -\contentsline {table}{\numberline {2.1}{\ignorespaces Title of the Second Table}}{4}{}% -\contentsline {table}{\numberline {2.2}{\ignorespaces Title of the Third Table}}{4}{}% -\contentsline {table}{\numberline {4.1}{\ignorespaces Title of the Second Table}}{14}{}% -\contentsline {table}{\numberline {4.2}{\ignorespaces Title of the Third Table}}{14}{}% -\contentsline {table}{\numberline {5.1}{\ignorespaces Title of the Second Table}}{16}{}% -\contentsline {table}{\numberline {5.2}{\ignorespaces Title of the Third Table}}{16}{}% -\contentsline {table}{\numberline {6.1}{\ignorespaces Title of the Second Table}}{18}{}% -\contentsline {table}{\numberline {6.2}{\ignorespaces Title of the Third Table}}{18}{}% -\contentsline {table}{\numberline {7.1}{\ignorespaces Title of the Second Table}}{20}{}% -\contentsline {table}{\numberline {7.2}{\ignorespaces Title of the Third Table}}{20}{}% -\contentsline {table}{\numberline {A.1}{\ignorespaces Title of the Only Table in this Appendix.}}{22}{}% -\contentsline {table}{\numberline {B.1}{\ignorespaces Title of the First Table in this Appendix.}}{23}{}% -\contentsline {table}{\numberline {B.2}{\ignorespaces Title of the Second Table in this Appendix.}}{24}{}% diff --git a/Schrick-Noah_MS-Thesis.pdf b/Schrick-Noah_MS-Thesis.pdf index d1f036c..878da6b 100644 Binary files a/Schrick-Noah_MS-Thesis.pdf and b/Schrick-Noah_MS-Thesis.pdf differ diff --git a/Schrick-Noah_MS-Thesis.toc b/Schrick-Noah_MS-Thesis.toc index b4f5fe7..655f898 100644 --- a/Schrick-Noah_MS-Thesis.toc +++ b/Schrick-Noah_MS-Thesis.toc @@ -5,48 +5,86 @@ {\hfill \ } \contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{vii}{}% +\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{viii}{}% +\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{ix}{}% +\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}% \contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}% -\contentsline {section}{\numberline {1.1}\bf First Heading: The Introduction}{1}{}% -\contentsline {section}{\numberline {1.2}\bf Second Heading}{1}{}% -\contentsline {subsection}{\numberline {1.2.1}\it First Subheading}{1}{}% -\contentsline {subsection}{\numberline {1.2.2}\it Second Subheading}{1}{}% -\contentsline {subsubsection}{First Sub-subsection Header}{1}{}% -\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{3}{}% -\contentsline {section}{\numberline {2.1}\bf First Heading}{3}{}% -\contentsline {section}{\numberline {2.2}\bf Second Heading}{4}{}% -\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{5}{}% -\contentsline {section}{\numberline {3.1}\bf Path Walking}{5}{}% -\contentsline {section}{\numberline {3.2}\bf Compound Operators}{6}{}% -\contentsline {section}{\numberline {3.3}\bf Color Coding}{7}{}% -\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{9}{}% -\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{9}{}% -\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{10}{}% -\contentsline {subsection}{\numberline {3.4.3}\it Portability}{11}{}% -\contentsline {section}{\numberline {3.5}\bf Relational Operators}{12}{}% -\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{13}{}% -\contentsline {section}{\numberline {4.1}\bf First Heading}{13}{}% -\contentsline {section}{\numberline {4.2}\bf Second Heading}{14}{}% -\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{15}{}% -\contentsline {section}{\numberline {5.1}\bf Tasking Approach}{15}{}% -\contentsline {section}{\numberline {5.2}\bf Subgraphing Approach}{16}{}% -\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{17}{}% -\contentsline {section}{\numberline {6.1}\bf First Heading}{17}{}% -\contentsline {section}{\numberline {6.2}\bf Second Heading}{18}{}% -\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{19}{}% -\contentsline {section}{\numberline {7.1}\bf First Heading}{19}{}% -\contentsline {section}{\numberline {7.2}\bf Second Heading}{20}{}% +\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}% +\contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}% +\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}% +\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}% +\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}% +\contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}% +\contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}% +\contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}% +\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}% +\contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}% +\contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}% +\contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}% +\contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}% +\contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}% +\contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}% +\contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}% +\contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}% +\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}% +\contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}% +\contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}% +\contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}% +\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}% +\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}% +\contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}% +\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}% +\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}% +\contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}% +\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}% +\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}% +\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}% +\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}% +\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}% +\contentsline {subsubsection}{Communication Structure}{12}{}% +\contentsline {subsubsection}{Task Zero}{12}{}% +\contentsline {subsubsection}{Task One}{12}{}% +\contentsline {subsubsection}{Task Two}{12}{}% +\contentsline {subsubsection}{Task Three}{12}{}% +\contentsline {subsubsection}{Task Four}{12}{}% +\contentsline {subsubsection}{Task Five}{13}{}% +\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}% +\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}% +\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}% +\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}% +\contentsline {subsubsection}{Communication Structure}{13}{}% +\contentsline {subsubsection}{Worker Nodes}{13}{}% +\contentsline {subsubsection}{Root Node}{13}{}% +\contentsline {subsubsection}{Database Node}{13}{}% +\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}% +\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}% +\contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}% +\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}% +\contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}% +\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}% +\contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}% +\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}% +\contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}% +\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}% +\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}% +\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}% +\contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}% +\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}% +\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}% +\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}% +\contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}% +\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}% +\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}% +\contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}% +\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}% \addvspace {10pt} -\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}% +\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}% {\hfill \ } -\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{22}{}% -\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{23}{}% -\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{23}{}% -\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{23}{}% -\contentsline {subsubsection}{A Sub-subsection in an Appendix}{23}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}% +\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}% +\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}% +\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}% +\contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}%