79 lines
6.5 KiB
TeX
79 lines
6.5 KiB
TeX
{\vspace {3\baselineskip }}
|
|
\contentsline {section}{\hspace {-\parindent }COPYRIGHT}{iii}{Doc-Start}%
|
|
{\hfill \ }
|
|
\contentsline {section}{\hspace {-\parindent }ABSTRACT}{iv}{Doc-Start}%
|
|
{\hfill \ }
|
|
\contentsline {section}{\hspace {-\parindent }ACKNOWLEDGEMENTS}{v}{Doc-Start}%
|
|
{\hfill \ }
|
|
\contentsline {section}{\hspace {-\parindent }TABLE OF CONTENTS}{viii}{Doc-Start}%
|
|
{\hfill \ }
|
|
\contentsline {section}{\hspace {-\parindent }LIST OF TABLES}{ix}{Doc-Start}%
|
|
{\hfill \ }
|
|
\contentsline {section}{\hspace {-\parindent }LIST OF FIGURES}{xi}{Doc-Start}%
|
|
\contentsline {chapter}{\numberline {CHAPTER 1: }{\bf \uppercase {INTRODUCTION}}}{1}{chapter.1}%
|
|
\contentsline {section}{\numberline {1.1}\bf Introduction to Attack Graphs}{1}{section.1.1}%
|
|
\contentsline {section}{\numberline {1.2}\bf Application to Compliance}{2}{section.1.2}%
|
|
\contentsline {subsection}{\numberline {1.2.1}\it Introduction to Compliance Graphs}{2}{subsection.1.2.1}%
|
|
\contentsline {subsection}{\numberline {1.2.2}\it Defining Compliance Graphs}{3}{subsection.1.2.2}%
|
|
\contentsline {subsection}{\numberline {1.2.3}\it Difficulties of Compliance Graphs}{3}{subsection.1.2.3}%
|
|
\contentsline {section}{\numberline {1.3}\bf Objectives and Contributions}{4}{section.1.3}%
|
|
\contentsline {chapter}{\numberline {CHAPTER 2: }{\bf \uppercase {RELATED WORKS}}}{5}{chapter.2}%
|
|
\contentsline {section}{\numberline {2.1}\bf Introduction to Graph Generation}{5}{section.2.1}%
|
|
\contentsline {section}{\numberline {2.2}\bf Graph Generation Improvements}{5}{section.2.2}%
|
|
\contentsline {section}{\numberline {2.3}\bf Improvements Specific to Attack Graph Generation}{6}{section.2.3}%
|
|
\contentsline {chapter}{\numberline {CHAPTER 3: }{\bf \uppercase {UTILITY EXTENSIONS TO THE RAGE ATTACK GRAPH GENERATOR}}}{8}{chapter.3}%
|
|
\contentsline {section}{\numberline {3.1}\bf Path Walking}{8}{section.3.1}%
|
|
\contentsline {section}{\numberline {3.2}\bf Color Coding}{9}{section.3.2}%
|
|
\contentsline {section}{\numberline {3.3}\bf Compound Operators}{11}{section.3.3}%
|
|
\contentsline {section}{\numberline {3.4}\bf Relational Operators}{12}{section.3.4}%
|
|
\contentsline {section}{\numberline {3.5}\bf Intermediate Database Storage}{13}{section.3.5}%
|
|
\contentsline {subsection}{\numberline {3.5.1}\it Introduction to Intermediate Database Storage}{13}{subsection.3.5.1}%
|
|
\contentsline {subsection}{\numberline {3.5.2}\it Memory Constraint Difficulties}{14}{subsection.3.5.2}%
|
|
\contentsline {subsection}{\numberline {3.5.3}\it Maximizing Performance with Intermediate Database Storage}{15}{subsection.3.5.3}%
|
|
\contentsline {subsection}{\numberline {3.5.4}\it Portability}{17}{subsection.3.5.4}%
|
|
\contentsline {chapter}{\numberline {CHAPTER 4: }{\bf \uppercase {SYNCHRONOUS FIRING}}}{18}{chapter.4}%
|
|
\contentsline {section}{\numberline {4.1}\bf Introduction}{18}{section.4.1}%
|
|
\contentsline {subsection}{\numberline {4.1.1}\it Related Synchronous Firing Work}{19}{subsection.4.1.1}%
|
|
\contentsline {section}{\numberline {4.2}\bf Necessary Alterations and Additions}{20}{section.4.2}%
|
|
\contentsline {subsection}{\numberline {4.2.1}\it GNU Bison and Flex}{20}{subsection.4.2.1}%
|
|
\contentsline {subsection}{\numberline {4.2.2}\it PostgreSQL}{22}{subsection.4.2.2}%
|
|
\contentsline {subsection}{\numberline {4.2.3}\it Compound Operators}{22}{subsection.4.2.3}%
|
|
\contentsline {subsection}{\numberline {4.2.4}\it Graph Generation}{23}{subsection.4.2.4}%
|
|
\contentsline {section}{\numberline {4.3}\bf Experimental Networks and Results}{23}{section.4.3}%
|
|
\contentsline {subsection}{\numberline {4.3.1}\it Experimental Networks}{25}{subsection.4.3.1}%
|
|
\contentsline {subsection}{\numberline {4.3.2}\it Results}{26}{subsection.4.3.2}%
|
|
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Parallelization Using MESSAGE PASSING INTERFACE}}}{29}{chapter.5}%
|
|
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack and Compliance Graph Generation}{29}{section.5.1}%
|
|
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{29}{section.5.2}%
|
|
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{29}{subsection.5.2.1}%
|
|
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{30}{section.5.3}%
|
|
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{30}{subsection.5.3.1}%
|
|
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{32}{subsection.5.3.2}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.1}Communication Structure}{34}{subsubsection.5.3.2.1}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.2}Task 0}{34}{subsubsection.5.3.2.2}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.3}Task 1}{34}{subsubsection.5.3.2.3}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.4}Task 2}{35}{subsubsection.5.3.2.4}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.5}Task 3}{37}{subsubsection.5.3.2.5}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.6}Task 4 and Task 5}{38}{subsubsection.5.3.2.6}%
|
|
\contentsline {subsubsection}{\numberline {5.3.2.7}MPI Tags}{38}{subsubsection.5.3.2.7}%
|
|
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations and Use Cases}{38}{subsection.5.3.3}%
|
|
\contentsline {subsection}{\numberline {5.3.4}\it Results}{39}{subsection.5.3.4}%
|
|
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{41}{section.5.4}%
|
|
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{41}{subsection.5.4.1}%
|
|
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{44}{subsection.5.4.2}%
|
|
\contentsline {subsubsection}{\numberline {5.4.2.1}Worker Nodes}{44}{subsubsection.5.4.2.1}%
|
|
\contentsline {subsubsection}{\numberline {5.4.2.2}Root Node}{45}{subsubsection.5.4.2.2}%
|
|
\contentsline {subsubsection}{\numberline {5.4.2.3}Database Node}{47}{subsubsection.5.4.2.3}%
|
|
\contentsline {subsubsection}{\numberline {5.4.2.4}MPI Tags}{47}{subsubsection.5.4.2.4}%
|
|
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations and Use Cases}{47}{subsection.5.4.3}%
|
|
\contentsline {subsection}{\numberline {5.4.4}\it Results}{48}{subsection.5.4.4}%
|
|
\contentsline {subsection}{\numberline {5.4.5}\it Subgraphing Result Analysis}{54}{subsection.5.4.5}%
|
|
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{58}{chapter.6}%
|
|
\contentsline {section}{\numberline {6.1}\bf Conclusions}{58}{section.6.1}%
|
|
\contentsline {section}{\numberline {6.2}\bf Future Work}{59}{section.6.2}%
|
|
{\hfill \ }
|
|
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{62}{figure.caption.33}%
|
|
\addvspace {10pt}
|
|
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{62}{figure.caption.33}%
|
|
{\hfill \ }
|