Report creation and formatting. 1.1 and 1.2 complete.
This commit is contained in:
parent
054d631286
commit
3b682e70ac
1284
Report/Bibliography.bib
Normal file
1284
Report/Bibliography.bib
Normal file
File diff suppressed because it is too large
Load Diff
36
Report/Schrick-Noah_CS-7863_Final-Report.aux
Normal file
36
Report/Schrick-Noah_CS-7863_Final-Report.aux
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
\relax
|
||||||
|
\providecommand\babel@aux[2]{}
|
||||||
|
\@nameuse{bbl@beforestart}
|
||||||
|
\citation{phillips_graph-based_1998}
|
||||||
|
\citation{schneier_modeling_1999}
|
||||||
|
\babel@aux{nil}{}
|
||||||
|
\citation{j_hale_compliance_nodate}
|
||||||
|
\citation{baloyi_guidelines_2019}
|
||||||
|
\citation{allman_complying_2006}
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}\protected@file@percent }
|
||||||
|
\bibdata{Bibliography}
|
||||||
|
\bibcite{phillips_graph-based_1998}{1}
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Works}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {3}Experimental Networks}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Degree}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Application}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Application}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{4}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{Bibliography}{4}{}\protected@file@percent }
|
||||||
|
\bibcite{schneier_modeling_1999}{2}
|
||||||
|
\bibstyle{ieeetr}
|
||||||
|
\gdef \@abspage@last{5}
|
||||||
13
Report/Schrick-Noah_CS-7863_Final-Report.bbl
Normal file
13
Report/Schrick-Noah_CS-7863_Final-Report.bbl
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
\begin{thebibliography}{1}
|
||||||
|
|
||||||
|
\bibitem{phillips_graph-based_1998}
|
||||||
|
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
|
||||||
|
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
|
||||||
|
F1292, pp.~71--79, 1998.
|
||||||
|
\newblock doi: 10.1145/310889.310919.
|
||||||
|
|
||||||
|
\bibitem{schneier_modeling_1999}
|
||||||
|
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
|
||||||
|
\newblock vol. 24, no.12.
|
||||||
|
|
||||||
|
\end{thebibliography}
|
||||||
46
Report/Schrick-Noah_CS-7863_Final-Report.blg
Normal file
46
Report/Schrick-Noah_CS-7863_Final-Report.blg
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
This is BibTeX, Version 0.99d (TeX Live 2022/Arch Linux)
|
||||||
|
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
|
||||||
|
The top-level auxiliary file: Schrick-Noah_CS-7863_Final-Report.aux
|
||||||
|
The style file: ieeetr.bst
|
||||||
|
Database file #1: Bibliography.bib
|
||||||
|
You've used 2 entries,
|
||||||
|
1876 wiz_defined-function locations,
|
||||||
|
491 strings with 3842 characters,
|
||||||
|
and the built_in function-call counts, 464 in all, are:
|
||||||
|
= -- 49
|
||||||
|
> -- 12
|
||||||
|
< -- 0
|
||||||
|
+ -- 5
|
||||||
|
- -- 3
|
||||||
|
* -- 28
|
||||||
|
:= -- 76
|
||||||
|
add.period$ -- 4
|
||||||
|
call.type$ -- 2
|
||||||
|
change.case$ -- 2
|
||||||
|
chr.to.int$ -- 0
|
||||||
|
cite$ -- 2
|
||||||
|
duplicate$ -- 24
|
||||||
|
empty$ -- 45
|
||||||
|
format.name$ -- 3
|
||||||
|
if$ -- 110
|
||||||
|
int.to.chr$ -- 0
|
||||||
|
int.to.str$ -- 2
|
||||||
|
missing$ -- 2
|
||||||
|
newline$ -- 11
|
||||||
|
num.names$ -- 2
|
||||||
|
pop$ -- 4
|
||||||
|
preamble$ -- 1
|
||||||
|
purify$ -- 0
|
||||||
|
quote$ -- 0
|
||||||
|
skip$ -- 13
|
||||||
|
stack$ -- 0
|
||||||
|
substring$ -- 24
|
||||||
|
swap$ -- 8
|
||||||
|
text.length$ -- 0
|
||||||
|
text.prefix$ -- 0
|
||||||
|
top$ -- 0
|
||||||
|
type$ -- 0
|
||||||
|
warning$ -- 0
|
||||||
|
while$ -- 5
|
||||||
|
width$ -- 3
|
||||||
|
write$ -- 24
|
||||||
360
Report/Schrick-Noah_CS-7863_Final-Report.log
Normal file
360
Report/Schrick-Noah_CS-7863_Final-Report.log
Normal file
@ -0,0 +1,360 @@
|
|||||||
|
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 2 MAY 2022 12:56
|
||||||
|
entering extended mode
|
||||||
|
restricted \write18 enabled.
|
||||||
|
%&-line parsing enabled.
|
||||||
|
**Schrick-Noah_CS-7863_Final-Report.tex
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.tex
|
||||||
|
LaTeX2e <2021-11-15> patch level 1
|
||||||
|
L3 programming layer <2022-04-10>
|
||||||
|
(/usr/share/texmf-dist/tex/latex/setspace/setspace.sty
|
||||||
|
Package: setspace 2011/12/19 v6.7a set line spacing
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/article.cls
|
||||||
|
Document Class: article 2021/10/04 v1.4n Standard LaTeX document class
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/size10.clo
|
||||||
|
File: size10.clo 2021/10/04 v1.4n Standard LaTeX file (size option)
|
||||||
|
)
|
||||||
|
\c@part=\count185
|
||||||
|
\c@section=\count186
|
||||||
|
\c@subsection=\count187
|
||||||
|
\c@subsubsection=\count188
|
||||||
|
\c@paragraph=\count189
|
||||||
|
\c@subparagraph=\count190
|
||||||
|
\c@figure=\count191
|
||||||
|
\c@table=\count192
|
||||||
|
\abovecaptionskip=\skip47
|
||||||
|
\belowcaptionskip=\skip48
|
||||||
|
\bibindent=\dimen138
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/boxedminipage/boxedminipage.sty
|
||||||
|
Package: boxedminipage 2020/04/19 v1.1 Boxed LaTeX2e minipages
|
||||||
|
\bmp@box=\box50
|
||||||
|
\bmp@width=\skip49
|
||||||
|
\bmp@height=\skip50
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
|
||||||
|
Package: graphicx 2021/09/16 v1.2d Enhanced LaTeX Graphics (DPC,SPQR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
|
||||||
|
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
|
||||||
|
\KV@toks@=\toks16
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/graphics.sty
|
||||||
|
Package: graphics 2021/03/04 v1.4d Standard LaTeX Graphics (DPC,SPQR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics/trig.sty
|
||||||
|
Package: trig 2021/08/11 v1.11 sin cos tan (DPC)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
|
||||||
|
File: graphics.cfg 2016/06/04 v1.11 sample graphics configuration
|
||||||
|
)
|
||||||
|
Package graphics Info: Driver file: pdftex.def on input line 107.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
|
||||||
|
File: pdftex.def 2020/10/05 v1.2a Graphics/color driver for pdftex
|
||||||
|
))
|
||||||
|
\Gin@req@height=\dimen139
|
||||||
|
\Gin@req@width=\dimen140
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/caption/subcaption.sty
|
||||||
|
Package: subcaption 2022/01/07 v1.5 Sub-captions (AR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/caption/caption.sty
|
||||||
|
Package: caption 2022/03/01 v3.6b Customizing captions (AR)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/caption/caption3.sty
|
||||||
|
Package: caption3 2022/03/17 v2.3b caption3 kernel (AR)
|
||||||
|
\caption@tempdima=\dimen141
|
||||||
|
\captionmargin=\dimen142
|
||||||
|
\caption@leftmargin=\dimen143
|
||||||
|
\caption@rightmargin=\dimen144
|
||||||
|
\caption@width=\dimen145
|
||||||
|
\caption@indent=\dimen146
|
||||||
|
\caption@parindent=\dimen147
|
||||||
|
\caption@hangindent=\dimen148
|
||||||
|
Package caption Info: Standard document class detected.
|
||||||
|
)
|
||||||
|
\c@caption@flags=\count193
|
||||||
|
\c@continuedfloat=\count194
|
||||||
|
)
|
||||||
|
\c@subfigure=\count195
|
||||||
|
\c@subtable=\count196
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/algorithms/algorithm.sty
|
||||||
|
Package: algorithm 2009/08/24 v0.1 Document Style `algorithm' - floating enviro
|
||||||
|
nment
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/float/float.sty
|
||||||
|
Package: float 2001/11/08 v1.3d Float enhancements (AL)
|
||||||
|
\c@float@type=\count197
|
||||||
|
\float@exts=\toks17
|
||||||
|
\float@box=\box51
|
||||||
|
\@float@everytoks=\toks18
|
||||||
|
\@floatcapt=\box52
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/ifthen.sty
|
||||||
|
Package: ifthen 2020/11/24 v1.1c Standard LaTeX ifthen package (DPC)
|
||||||
|
)
|
||||||
|
\@float@every@algorithm=\toks19
|
||||||
|
\c@algorithm=\count198
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/algorithmicx/algpseudocode.sty
|
||||||
|
Package: algpseudocode
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/algorithmicx/algorithmicx.sty
|
||||||
|
Package: algorithmicx 2005/04/27 v1.2 Algorithmicx
|
||||||
|
|
||||||
|
Document Style algorithmicx 1.2 - a greatly improved `algorithmic' style
|
||||||
|
\c@ALG@line=\count199
|
||||||
|
\c@ALG@rem=\count266
|
||||||
|
\c@ALG@nested=\count267
|
||||||
|
\ALG@tlm=\skip51
|
||||||
|
\ALG@thistlm=\skip52
|
||||||
|
\c@ALG@Lnr=\count268
|
||||||
|
\c@ALG@blocknr=\count269
|
||||||
|
\c@ALG@storecount=\count270
|
||||||
|
\c@ALG@tmpcounter=\count271
|
||||||
|
\ALG@tmplength=\skip53
|
||||||
|
)
|
||||||
|
Document Style - pseudocode environments for use with the `algorithmicx' style
|
||||||
|
) (/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
|
||||||
|
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
|
||||||
|
Package: iftex 2022/02/03 v1.0f TeX engine tests
|
||||||
|
))
|
||||||
|
(/usr/share/texmf-dist/tex/generic/babel/babel.sty
|
||||||
|
Package: babel 2022/02/26 3.73 The Babel package
|
||||||
|
\babel@savecnt=\count272
|
||||||
|
\U@D=\dimen149
|
||||||
|
\l@unhyphenated=\language87
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/babel/txtbabel.def)
|
||||||
|
\bbl@readstream=\read2
|
||||||
|
\bbl@dirlevel=\count273
|
||||||
|
Package babel Info: You haven't specified a language. I'll use 'nil'
|
||||||
|
(babel) as the main language. Reported on input line 4305.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/babel/nil.ldf
|
||||||
|
Language: nil 2022/02/26 3.73 Nil language
|
||||||
|
\l@nil=\language88
|
||||||
|
))
|
||||||
|
(/usr/share/texmf-dist/tex/latex/base/inputenc.sty
|
||||||
|
Package: inputenc 2021/02/14 v1.3d Input encoding file
|
||||||
|
\inpenc@prehook=\toks20
|
||||||
|
\inpenc@posthook=\toks21
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/tools/indentfirst.sty
|
||||||
|
Package: indentfirst 1995/11/23 v1.03 Indent first paragraph (DPC)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
|
||||||
|
Package: tocloft 2017/08/31 v2.3i parameterised ToC, etc., typesetting
|
||||||
|
Package tocloft Info: The document has section divisions on input line 51.
|
||||||
|
\cftparskip=\skip54
|
||||||
|
\cftbeforetoctitleskip=\skip55
|
||||||
|
\cftaftertoctitleskip=\skip56
|
||||||
|
\cftbeforepartskip=\skip57
|
||||||
|
\cftpartnumwidth=\skip58
|
||||||
|
\cftpartindent=\skip59
|
||||||
|
\cftbeforesecskip=\skip60
|
||||||
|
\cftsecindent=\skip61
|
||||||
|
\cftsecnumwidth=\skip62
|
||||||
|
\cftbeforesubsecskip=\skip63
|
||||||
|
\cftsubsecindent=\skip64
|
||||||
|
\cftsubsecnumwidth=\skip65
|
||||||
|
\cftbeforesubsubsecskip=\skip66
|
||||||
|
\cftsubsubsecindent=\skip67
|
||||||
|
\cftsubsubsecnumwidth=\skip68
|
||||||
|
\cftbeforeparaskip=\skip69
|
||||||
|
\cftparaindent=\skip70
|
||||||
|
\cftparanumwidth=\skip71
|
||||||
|
\cftbeforesubparaskip=\skip72
|
||||||
|
\cftsubparaindent=\skip73
|
||||||
|
\cftsubparanumwidth=\skip74
|
||||||
|
\cftbeforeloftitleskip=\skip75
|
||||||
|
\cftafterloftitleskip=\skip76
|
||||||
|
\cftbeforefigskip=\skip77
|
||||||
|
\cftfigindent=\skip78
|
||||||
|
\cftfignumwidth=\skip79
|
||||||
|
\c@lofdepth=\count274
|
||||||
|
\c@lotdepth=\count275
|
||||||
|
\cftbeforelottitleskip=\skip80
|
||||||
|
\cftafterlottitleskip=\skip81
|
||||||
|
\cftbeforetabskip=\skip82
|
||||||
|
\cfttabindent=\skip83
|
||||||
|
\cfttabnumwidth=\skip84
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
|
||||||
|
File: l3backend-pdftex.def 2022-04-14 L3 backend support: PDF output (pdfTeX)
|
||||||
|
\l__color_backend_stack_int=\count276
|
||||||
|
\l__pdf_internal_box=\box53
|
||||||
|
)
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.aux)
|
||||||
|
\openout1 = `Schrick-Noah_CS-7863_Final-Report.aux'.
|
||||||
|
|
||||||
|
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 26.
|
||||||
|
LaTeX Font Info: ... okay on input line 26.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
|
||||||
|
[Loading MPS to PDF converter (version 2006.09.02).]
|
||||||
|
\scratchcounter=\count277
|
||||||
|
\scratchdimen=\dimen150
|
||||||
|
\scratchbox=\box54
|
||||||
|
\nofMPsegments=\count278
|
||||||
|
\nofMParguments=\count279
|
||||||
|
\everyMPshowfont=\toks22
|
||||||
|
\MPscratchCnt=\count280
|
||||||
|
\MPscratchDim=\dimen151
|
||||||
|
\MPnumerator=\count281
|
||||||
|
\makeMPintoPDFobject=\count282
|
||||||
|
\everyMPtoPDFconversion=\toks23
|
||||||
|
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
|
||||||
|
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
|
||||||
|
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/latex/grfext/grfext.sty
|
||||||
|
Package: grfext 2019/12/03 v1.3 Manage graphics extensions (HO)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
|
||||||
|
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
|
||||||
|
))
|
||||||
|
(/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
|
||||||
|
Package: kvoptions 2020-10-07 v3.14 Key value format for package options (HO)
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
|
||||||
|
Package: ltxcmds 2020-05-10 v1.25 LaTeX kernel commands for general use (HO)
|
||||||
|
)
|
||||||
|
(/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
|
||||||
|
Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
|
||||||
|
))
|
||||||
|
(/usr/share/texmf-dist/tex/generic/pdftexcmds/pdftexcmds.sty
|
||||||
|
Package: pdftexcmds 2020-06-27 v0.33 Utility functions of pdfTeX for LuaTeX (HO
|
||||||
|
)
|
||||||
|
Package pdftexcmds Info: \pdf@primitive is available.
|
||||||
|
Package pdftexcmds Info: \pdf@ifprimitive is available.
|
||||||
|
Package pdftexcmds Info: \pdfdraftmode found.
|
||||||
|
)
|
||||||
|
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
|
||||||
|
85.
|
||||||
|
Package grfext Info: Graphics extension search list:
|
||||||
|
(grfext) [.pdf,.png,.jpg,.mps,.jpeg,.jbig2,.jb2,.PDF,.PNG,.JPG,.JPE
|
||||||
|
G,.JBIG2,.JB2,.eps]
|
||||||
|
(grfext) \AppendGraphicsExtensions on input line 504.
|
||||||
|
|
||||||
|
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
|
||||||
|
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
|
||||||
|
e
|
||||||
|
))
|
||||||
|
Package caption Info: Begin \AtBeginDocument code.
|
||||||
|
Package caption Info: float package is loaded.
|
||||||
|
Package caption Info: End \AtBeginDocument code.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <12> on input line 28.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <8> on input line 28.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <6> on input line 28.
|
||||||
|
|
||||||
|
(./Schrick-Noah_CS-7863_Final-Report.toc
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <7> on input line 2.
|
||||||
|
LaTeX Font Info: External font `cmex10' loaded for size
|
||||||
|
(Font) <5> on input line 2.
|
||||||
|
)
|
||||||
|
\tf@toc=\write3
|
||||||
|
\openout3 = `Schrick-Noah_CS-7863_Final-Report.toc'.
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (21.08397pt too wide) in paragraph at lines 33--34
|
||||||
|
[]\OT1/cmr/m/n/10 To address the rising risks of computing and threats to cyber
|
||||||
|
security, vulnerability
|
||||||
|
[]
|
||||||
|
|
||||||
|
[1
|
||||||
|
|
||||||
|
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}]
|
||||||
|
Overfull \hbox (3.02843pt too wide) in paragraph at lines 35--36
|
||||||
|
[]\OT1/cmr/m/n/10 Attack graphs begin with a root node that contains all the cu
|
||||||
|
rrent information
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: Citation `j_hale_compliance_nodate' on page 2 undefined on input
|
||||||
|
line 38.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: Citation `baloyi_guidelines_2019' on page 2 undefined on input l
|
||||||
|
ine 38.
|
||||||
|
|
||||||
|
|
||||||
|
LaTeX Warning: Citation `allman_complying_2006' on page 2 undefined on input li
|
||||||
|
ne 38.
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (2.19508pt too wide) in paragraph at lines 38--39
|
||||||
|
[]\OT1/cmr/m/n/10 Compliance graphs are an alternate form of attack graphs, uti
|
||||||
|
lized specifically
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (0.79698pt too wide) in paragraph at lines 38--39
|
||||||
|
\OT1/cmr/m/n/10 for examining compliance and regulation statuses of systems. Li
|
||||||
|
ke attack graphs,
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (10.93585pt too wide) in paragraph at lines 40--41
|
||||||
|
\OT1/cmr/m/n/10 to also examine administrative policies and properties of syste
|
||||||
|
ms. Since compliance
|
||||||
|
[]
|
||||||
|
|
||||||
|
|
||||||
|
Overfull \hbox (2.69524pt too wide) in paragraph at lines 40--41
|
||||||
|
\OT1/cmr/m/n/10 and regulation is broad and can vary by industry and applicatio
|
||||||
|
n, the information
|
||||||
|
[]
|
||||||
|
|
||||||
|
[2] (./Schrick-Noah_CS-7863_Final-Report.bbl [3]
|
||||||
|
Overfull \vbox (137.26349pt too high) has occurred while \output is active []
|
||||||
|
|
||||||
|
|
||||||
|
[4]) [5] (./Schrick-Noah_CS-7863_Final-Report.aux)
|
||||||
|
|
||||||
|
LaTeX Warning: There were undefined references.
|
||||||
|
|
||||||
|
)
|
||||||
|
Here is how much of TeX's memory you used:
|
||||||
|
5354 strings out of 478238
|
||||||
|
96179 string characters out of 5850456
|
||||||
|
398243 words of memory out of 5000000
|
||||||
|
23531 multiletter control sequences out of 15000+600000
|
||||||
|
473860 words of font info for 43 fonts, out of 8000000 for 9000
|
||||||
|
1141 hyphenation exceptions out of 8191
|
||||||
|
67i,6n,77p,920b,219s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||||
|
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/
|
||||||
|
texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/texmf-dist/fon
|
||||||
|
ts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public
|
||||||
|
/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cm
|
||||||
|
r17.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmti10.pfb>
|
||||||
|
Output written on Schrick-Noah_CS-7863_Final-Report.pdf (5 pages, 103964 bytes)
|
||||||
|
.
|
||||||
|
PDF statistics:
|
||||||
|
50 PDF objects out of 1000 (max. 8388607)
|
||||||
|
30 compressed objects within 1 object stream
|
||||||
|
0 named destinations out of 1000 (max. 500000)
|
||||||
|
1 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||||
|
|
||||||
BIN
Report/Schrick-Noah_CS-7863_Final-Report.pdf
Normal file
BIN
Report/Schrick-Noah_CS-7863_Final-Report.pdf
Normal file
Binary file not shown.
73
Report/Schrick-Noah_CS-7863_Final-Report.tex
Normal file
73
Report/Schrick-Noah_CS-7863_Final-Report.tex
Normal file
@ -0,0 +1,73 @@
|
|||||||
|
\RequirePackage{setspace}
|
||||||
|
\documentclass{article}
|
||||||
|
\usepackage{boxedminipage}
|
||||||
|
\usepackage{graphicx} % Images
|
||||||
|
\graphicspath{ {./images/} }
|
||||||
|
\usepackage{subcaption} % Captions on subfigures
|
||||||
|
\usepackage{algorithm} % Math and Big Oh
|
||||||
|
\usepackage[noend]{algpseudocode}
|
||||||
|
\usepackage{ifpdf} % Detect PDF or DVI mode
|
||||||
|
\usepackage{babel} % Bibliography
|
||||||
|
|
||||||
|
\usepackage[utf8]{inputenc}
|
||||||
|
\usepackage{float}
|
||||||
|
\usepackage{indentfirst}
|
||||||
|
\setlength{\parskip}{\baselineskip}
|
||||||
|
|
||||||
|
% Table of Contents/Figure Spacing
|
||||||
|
\usepackage[titles]{tocloft}
|
||||||
|
\cftsetindents{figure}{0em}{3.5em}
|
||||||
|
\cftsetindents{table}{0em}{3.5em}
|
||||||
|
|
||||||
|
\title{CS 7863: Network Theory Final Project: Compliance Graph Analysis}
|
||||||
|
\author{Noah Schrick}
|
||||||
|
\date{May 3, 2022}
|
||||||
|
|
||||||
|
\begin{document}
|
||||||
|
|
||||||
|
\maketitle
|
||||||
|
\tableofcontents
|
||||||
|
|
||||||
|
\section{Introduction}
|
||||||
|
\subsection{Attack Graphs}
|
||||||
|
To address the rising risks of computing and threats to cybersecurity, vulnerability analysis modeling is a technique employed by experts to identify weak points in a system or set of systems. One such modeling approach is to represent the system or set of systems through graphical means, with system information encoded into the nodes and edges of the graph. This modeling approach was first utilized in the 1990s in a format called attack trees, and can be seen through the works of the authors of \cite{phillips_graph-based_1998} and \cite{schneier_modeling_1999}. These attack trees would later be expanded into attack graphs.
|
||||||
|
|
||||||
|
Attack graphs begin with a root node that contains all the current information of the system or set of systems. From this initial root state, all assets in the system are examined to see if any single modification can be made, where a modification is typically a change in system policy or security settings. If a modification can be made, an edge is drawn from the previous state to a new state that includes all of the previous state's information, but now reflects the change in the system. This edge is labeled to reflect which change was made to the system. This process is exhaustively repeated, where all system properties are examined, all attack options are fully enumerated, all permutations are examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process.
|
||||||
|
|
||||||
|
\subsection{Compliance Graphs}
|
||||||
|
Compliance graphs are an alternate form of attack graphs, utilized specifically for examining compliance and regulation statuses of systems. Like attack graphs, compliance graphs can also be used to determine all ways that systems may fall out of compliance or violate regulations. These graphs are notably useful for cyber-physical systems due to the increased need for compliance. As the authors of \cite{j_hale_compliance_nodate}, \cite{baloyi_guidelines_2019}, and \cite{allman_complying_2006} discuss, cyber-physical systems have seen greater usage, especially in areas such as critical infrastructure and Internet of Things.
|
||||||
|
|
||||||
|
The semantics of compliance graphs are similar to that of attack graphs, but with a few differences regarding the information at each state. While security and compliance statuses are related, the information that is analyzed in compliance graphs is focused less on certain security properties, and is expanded to also examine administrative policies and properties of systems. Since compliance and regulation is broad and can vary by industry and application, the information to analyze can range from safety regulations, maintenance compliance, or any other regulatory compliance. However, the graph structure of compliance graphs is identical to that of attack graphs, where edges represent a modification to the systems, and nodes represent all current information in the system.
|
||||||
|
|
||||||
|
\subsection{Difficulties of Compliance Graph Analysis}
|
||||||
|
|
||||||
|
\section{Related Works}
|
||||||
|
|
||||||
|
\section{Experimental Networks}
|
||||||
|
|
||||||
|
\section{Centralities}
|
||||||
|
\subsection{Introduction}
|
||||||
|
\subsection{Degree}
|
||||||
|
\subsection{Betweenness}
|
||||||
|
\subsection{Katz}
|
||||||
|
\subsection{K-Path Edge}
|
||||||
|
\subsection{Adapted Page Rank}
|
||||||
|
|
||||||
|
\section{Transitive Closure}
|
||||||
|
\subsection{Introduction}
|
||||||
|
\subsection{Application}
|
||||||
|
|
||||||
|
\section{Dominant Tree}
|
||||||
|
\subsection{Introduction}
|
||||||
|
\subsection{Application}
|
||||||
|
|
||||||
|
\section{Results and Result Analysis}
|
||||||
|
|
||||||
|
\section{Conclusions and Future Work}
|
||||||
|
|
||||||
|
\addcontentsline{toc}{section}{Bibliography}
|
||||||
|
\bibliography{Bibliography}
|
||||||
|
\bibliographystyle{ieeetr}
|
||||||
|
|
||||||
|
|
||||||
|
\end{document}
|
||||||
23
Report/Schrick-Noah_CS-7863_Final-Report.toc
Normal file
23
Report/Schrick-Noah_CS-7863_Final-Report.toc
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
\babel@toc {nil}{}\relax
|
||||||
|
\contentsline {section}{\numberline {1}Introduction}{2}{}%
|
||||||
|
\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}%
|
||||||
|
\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}%
|
||||||
|
\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {2}Related Works}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {3}Experimental Networks}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {4}Centralities}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {4.2}Degree}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {4.3}Betweenness}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {4.4}Katz}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {4.5}K-Path Edge}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {5}Transitive Closure}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {5.1}Introduction}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {5.2}Application}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {6}Dominant Tree}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.1}Introduction}{4}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.2}Application}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {7}Results and Result Analysis}{4}{}%
|
||||||
|
\contentsline {section}{\numberline {8}Conclusions and Future Work}{4}{}%
|
||||||
|
\contentsline {section}{Bibliography}{4}{}%
|
||||||
Loading…
x
Reference in New Issue
Block a user