{\vspace {3\baselineskip }} \contentsline {section}{\hspace {-\parindent }COPYRIGHT}{iii}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }ABSTRACT}{iv}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{x}{}% \contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{}% \contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{}% \contentsline {section}{\numberline {1.2}\bf Application to Cybersecurity and Compliance}{1}{}% \contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{1}{}% \contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{2}{}% \contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{2}{}% \contentsline {section}{\numberline {2.2}\bf Improvements to Attack Graph Generation}{2}{}% \contentsline {section}{\numberline {2.3}\bf Attack Dependency Graphs}{2}{}% \contentsline {section}{\numberline {2.4}\bf Compliance Graphs}{2}{}% \contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{3}{}% \contentsline {section}{\numberline {3.1}\bf Path Walking}{3}{}% \contentsline {section}{\numberline {3.2}\bf Compound Operators}{4}{}% \contentsline {section}{\numberline {3.3}\bf Color Coding}{5}{}% \contentsline {section}{\numberline {3.4}\bf Intermediate Database Storage}{7}{}% \contentsline {subsection}{\numberline {3.4.1}\it Memory Constraint Difficulties}{7}{}% \contentsline {subsection}{\numberline {3.4.2}\it Maximizing Performance with Intermediate Database Storage}{8}{}% \contentsline {subsection}{\numberline {3.4.3}\it Portability}{9}{}% \contentsline {section}{\numberline {3.5}\bf Relational Operators}{10}{}% \contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{11}{}% \contentsline {section}{\numberline {4.1}\bf Introduction}{11}{}% \contentsline {subsection}{\numberline {4.1.1}\it Synchronous Firing in Literature}{11}{}% \contentsline {section}{\numberline {4.2}\bf Necessary Components}{11}{}% \contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{11}{}% \contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{11}{}% \contentsline {subsection}{\numberline {4.3.2}\it Results}{11}{}% \contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{12}{}% \contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{12}{}% \contentsline {section}{\numberline {5.2}\bf Necessary Components}{12}{}% \contentsline {subsection}{\numberline {5.2.1}\it Serialization}{12}{}% \contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{12}{}% \contentsline {section}{\numberline {5.3}\bf Tasking Approach}{12}{}% \contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{12}{}% \contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{12}{}% \contentsline {subsubsection}{Communication Structure}{12}{}% \contentsline {subsubsection}{Task Zero}{12}{}% \contentsline {subsubsection}{Task One}{12}{}% \contentsline {subsubsection}{Task Two}{12}{}% \contentsline {subsubsection}{Task Three}{12}{}% \contentsline {subsubsection}{Task Four}{12}{}% \contentsline {subsubsection}{Task Five}{13}{}% \contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{13}{}% \contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{13}{}% \contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{13}{}% \contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{13}{}% \contentsline {subsubsection}{Communication Structure}{13}{}% \contentsline {subsubsection}{Worker Nodes}{13}{}% \contentsline {subsubsection}{Root Node}{13}{}% \contentsline {subsubsection}{Database Node}{13}{}% \contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{13}{}% \contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{14}{}% \contentsline {section}{\numberline {6.1}\bf Small Networks}{14}{}% \contentsline {subsection}{\numberline {6.1.1}\it Test Information}{14}{}% \contentsline {subsection}{\numberline {6.1.2}\it Results}{14}{}% \contentsline {subsection}{\numberline {6.1.3}\it Analysis}{14}{}% \contentsline {section}{\numberline {6.2}\bf Large Networks}{14}{}% \contentsline {subsection}{\numberline {6.2.1}\it Test Information}{14}{}% \contentsline {subsection}{\numberline {6.2.2}\it Results}{14}{}% \contentsline {subsection}{\numberline {6.2.3}\it Analysis}{14}{}% \contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{14}{}% \contentsline {subsection}{\numberline {6.3.1}\it Test Information}{14}{}% \contentsline {subsection}{\numberline {6.3.2}\it Results}{14}{}% \contentsline {subsection}{\numberline {6.3.3}\it Analysis}{14}{}% \contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{14}{}% \contentsline {subsection}{\numberline {6.4.1}\it Test Information}{15}{}% \contentsline {subsection}{\numberline {6.4.2}\it Results}{15}{}% \contentsline {subsection}{\numberline {6.4.3}\it Analysis}{15}{}% \contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{16}{}% \contentsline {section}{\numberline {7.1}\bf Future Work}{16}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{17}{}% \addvspace {10pt} \contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{17}{}% {\hfill \ } \contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{18}{}% \contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{19}{}% \contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{19}{}% \contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{19}{}% \contentsline {subsubsection}{A Sub-subsection in an Appendix}{19}{}%