Report creation and formatting. 1.1 and 1.2 complete.

This commit is contained in:
Noah L. Schrick 2022-05-02 12:57:34 -05:00
parent 054d631286
commit 3b682e70ac
8 changed files with 1835 additions and 0 deletions

1284
Report/Bibliography.bib Normal file

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,36 @@
\relax
\providecommand\babel@aux[2]{}
\@nameuse{bbl@beforestart}
\citation{phillips_graph-based_1998}
\citation{schneier_modeling_1999}
\babel@aux{nil}{}
\citation{j_hale_compliance_nodate}
\citation{baloyi_guidelines_2019}
\citation{allman_complying_2006}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}\protected@file@percent }
\bibdata{Bibliography}
\bibcite{phillips_graph-based_1998}{1}
\@writefile{toc}{\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Works}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {3}Experimental Networks}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {4}Centralities}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Degree}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Betweenness}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Katz}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}K-Path Edge}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {5}Transitive Closure}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Introduction}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Application}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {6}Dominant Tree}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Introduction}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Application}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {7}Results and Result Analysis}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{\numberline {8}Conclusions and Future Work}{4}{}\protected@file@percent }
\@writefile{toc}{\contentsline {section}{Bibliography}{4}{}\protected@file@percent }
\bibcite{schneier_modeling_1999}{2}
\bibstyle{ieeetr}
\gdef \@abspage@last{5}

View File

@ -0,0 +1,13 @@
\begin{thebibliography}{1}
\bibitem{phillips_graph-based_1998}
C.~Phillips and L.~P. Swiler, ``A graph-based system for network-vulnerability
analysis,'' {\em Proceedings New Security Paradigms Workshop}, vol.~Part
F1292, pp.~71--79, 1998.
\newblock doi: 10.1145/310889.310919.
\bibitem{schneier_modeling_1999}
B.~Schneier, ``Modeling {Security} {Threats},'' {\em Dr. Dobb's Journal}, 1999.
\newblock vol. 24, no.12.
\end{thebibliography}

View File

@ -0,0 +1,46 @@
This is BibTeX, Version 0.99d (TeX Live 2022/Arch Linux)
Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
The top-level auxiliary file: Schrick-Noah_CS-7863_Final-Report.aux
The style file: ieeetr.bst
Database file #1: Bibliography.bib
You've used 2 entries,
1876 wiz_defined-function locations,
491 strings with 3842 characters,
and the built_in function-call counts, 464 in all, are:
= -- 49
> -- 12
< -- 0
+ -- 5
- -- 3
* -- 28
:= -- 76
add.period$ -- 4
call.type$ -- 2
change.case$ -- 2
chr.to.int$ -- 0
cite$ -- 2
duplicate$ -- 24
empty$ -- 45
format.name$ -- 3
if$ -- 110
int.to.chr$ -- 0
int.to.str$ -- 2
missing$ -- 2
newline$ -- 11
num.names$ -- 2
pop$ -- 4
preamble$ -- 1
purify$ -- 0
quote$ -- 0
skip$ -- 13
stack$ -- 0
substring$ -- 24
swap$ -- 8
text.length$ -- 0
text.prefix$ -- 0
top$ -- 0
type$ -- 0
warning$ -- 0
while$ -- 5
width$ -- 3
write$ -- 24

View File

@ -0,0 +1,360 @@
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 2 MAY 2022 12:56
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
**Schrick-Noah_CS-7863_Final-Report.tex
(./Schrick-Noah_CS-7863_Final-Report.tex
LaTeX2e <2021-11-15> patch level 1
L3 programming layer <2022-04-10>
(/usr/share/texmf-dist/tex/latex/setspace/setspace.sty
Package: setspace 2011/12/19 v6.7a set line spacing
)
(/usr/share/texmf-dist/tex/latex/base/article.cls
Document Class: article 2021/10/04 v1.4n Standard LaTeX document class
(/usr/share/texmf-dist/tex/latex/base/size10.clo
File: size10.clo 2021/10/04 v1.4n Standard LaTeX file (size option)
)
\c@part=\count185
\c@section=\count186
\c@subsection=\count187
\c@subsubsection=\count188
\c@paragraph=\count189
\c@subparagraph=\count190
\c@figure=\count191
\c@table=\count192
\abovecaptionskip=\skip47
\belowcaptionskip=\skip48
\bibindent=\dimen138
)
(/usr/share/texmf-dist/tex/latex/boxedminipage/boxedminipage.sty
Package: boxedminipage 2020/04/19 v1.1 Boxed LaTeX2e minipages
\bmp@box=\box50
\bmp@width=\skip49
\bmp@height=\skip50
)
(/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
Package: graphicx 2021/09/16 v1.2d Enhanced LaTeX Graphics (DPC,SPQR)
(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
Package: keyval 2014/10/28 v1.15 key=value parser (DPC)
\KV@toks@=\toks16
)
(/usr/share/texmf-dist/tex/latex/graphics/graphics.sty
Package: graphics 2021/03/04 v1.4d Standard LaTeX Graphics (DPC,SPQR)
(/usr/share/texmf-dist/tex/latex/graphics/trig.sty
Package: trig 2021/08/11 v1.11 sin cos tan (DPC)
)
(/usr/share/texmf-dist/tex/latex/graphics-cfg/graphics.cfg
File: graphics.cfg 2016/06/04 v1.11 sample graphics configuration
)
Package graphics Info: Driver file: pdftex.def on input line 107.
(/usr/share/texmf-dist/tex/latex/graphics-def/pdftex.def
File: pdftex.def 2020/10/05 v1.2a Graphics/color driver for pdftex
))
\Gin@req@height=\dimen139
\Gin@req@width=\dimen140
)
(/usr/share/texmf-dist/tex/latex/caption/subcaption.sty
Package: subcaption 2022/01/07 v1.5 Sub-captions (AR)
(/usr/share/texmf-dist/tex/latex/caption/caption.sty
Package: caption 2022/03/01 v3.6b Customizing captions (AR)
(/usr/share/texmf-dist/tex/latex/caption/caption3.sty
Package: caption3 2022/03/17 v2.3b caption3 kernel (AR)
\caption@tempdima=\dimen141
\captionmargin=\dimen142
\caption@leftmargin=\dimen143
\caption@rightmargin=\dimen144
\caption@width=\dimen145
\caption@indent=\dimen146
\caption@parindent=\dimen147
\caption@hangindent=\dimen148
Package caption Info: Standard document class detected.
)
\c@caption@flags=\count193
\c@continuedfloat=\count194
)
\c@subfigure=\count195
\c@subtable=\count196
)
(/usr/share/texmf-dist/tex/latex/algorithms/algorithm.sty
Package: algorithm 2009/08/24 v0.1 Document Style `algorithm' - floating enviro
nment
(/usr/share/texmf-dist/tex/latex/float/float.sty
Package: float 2001/11/08 v1.3d Float enhancements (AL)
\c@float@type=\count197
\float@exts=\toks17
\float@box=\box51
\@float@everytoks=\toks18
\@floatcapt=\box52
)
(/usr/share/texmf-dist/tex/latex/base/ifthen.sty
Package: ifthen 2020/11/24 v1.1c Standard LaTeX ifthen package (DPC)
)
\@float@every@algorithm=\toks19
\c@algorithm=\count198
)
(/usr/share/texmf-dist/tex/latex/algorithmicx/algpseudocode.sty
Package: algpseudocode
(/usr/share/texmf-dist/tex/latex/algorithmicx/algorithmicx.sty
Package: algorithmicx 2005/04/27 v1.2 Algorithmicx
Document Style algorithmicx 1.2 - a greatly improved `algorithmic' style
\c@ALG@line=\count199
\c@ALG@rem=\count266
\c@ALG@nested=\count267
\ALG@tlm=\skip51
\ALG@thistlm=\skip52
\c@ALG@Lnr=\count268
\c@ALG@blocknr=\count269
\c@ALG@storecount=\count270
\c@ALG@tmpcounter=\count271
\ALG@tmplength=\skip53
)
Document Style - pseudocode environments for use with the `algorithmicx' style
) (/usr/share/texmf-dist/tex/generic/iftex/ifpdf.sty
Package: ifpdf 2019/10/25 v3.4 ifpdf legacy package. Use iftex instead.
(/usr/share/texmf-dist/tex/generic/iftex/iftex.sty
Package: iftex 2022/02/03 v1.0f TeX engine tests
))
(/usr/share/texmf-dist/tex/generic/babel/babel.sty
Package: babel 2022/02/26 3.73 The Babel package
\babel@savecnt=\count272
\U@D=\dimen149
\l@unhyphenated=\language87
(/usr/share/texmf-dist/tex/generic/babel/txtbabel.def)
\bbl@readstream=\read2
\bbl@dirlevel=\count273
Package babel Info: You haven't specified a language. I'll use 'nil'
(babel) as the main language. Reported on input line 4305.
(/usr/share/texmf-dist/tex/generic/babel/nil.ldf
Language: nil 2022/02/26 3.73 Nil language
\l@nil=\language88
))
(/usr/share/texmf-dist/tex/latex/base/inputenc.sty
Package: inputenc 2021/02/14 v1.3d Input encoding file
\inpenc@prehook=\toks20
\inpenc@posthook=\toks21
)
(/usr/share/texmf-dist/tex/latex/tools/indentfirst.sty
Package: indentfirst 1995/11/23 v1.03 Indent first paragraph (DPC)
)
(/usr/share/texmf-dist/tex/latex/tocloft/tocloft.sty
Package: tocloft 2017/08/31 v2.3i parameterised ToC, etc., typesetting
Package tocloft Info: The document has section divisions on input line 51.
\cftparskip=\skip54
\cftbeforetoctitleskip=\skip55
\cftaftertoctitleskip=\skip56
\cftbeforepartskip=\skip57
\cftpartnumwidth=\skip58
\cftpartindent=\skip59
\cftbeforesecskip=\skip60
\cftsecindent=\skip61
\cftsecnumwidth=\skip62
\cftbeforesubsecskip=\skip63
\cftsubsecindent=\skip64
\cftsubsecnumwidth=\skip65
\cftbeforesubsubsecskip=\skip66
\cftsubsubsecindent=\skip67
\cftsubsubsecnumwidth=\skip68
\cftbeforeparaskip=\skip69
\cftparaindent=\skip70
\cftparanumwidth=\skip71
\cftbeforesubparaskip=\skip72
\cftsubparaindent=\skip73
\cftsubparanumwidth=\skip74
\cftbeforeloftitleskip=\skip75
\cftafterloftitleskip=\skip76
\cftbeforefigskip=\skip77
\cftfigindent=\skip78
\cftfignumwidth=\skip79
\c@lofdepth=\count274
\c@lotdepth=\count275
\cftbeforelottitleskip=\skip80
\cftafterlottitleskip=\skip81
\cftbeforetabskip=\skip82
\cfttabindent=\skip83
\cfttabnumwidth=\skip84
)
(/usr/share/texmf-dist/tex/latex/l3backend/l3backend-pdftex.def
File: l3backend-pdftex.def 2022-04-14 L3 backend support: PDF output (pdfTeX)
\l__color_backend_stack_int=\count276
\l__pdf_internal_box=\box53
)
(./Schrick-Noah_CS-7863_Final-Report.aux)
\openout1 = `Schrick-Noah_CS-7863_Final-Report.aux'.
LaTeX Font Info: Checking defaults for OML/cmm/m/it on input line 26.
LaTeX Font Info: ... okay on input line 26.
LaTeX Font Info: Checking defaults for OMS/cmsy/m/n on input line 26.
LaTeX Font Info: ... okay on input line 26.
LaTeX Font Info: Checking defaults for OT1/cmr/m/n on input line 26.
LaTeX Font Info: ... okay on input line 26.
LaTeX Font Info: Checking defaults for T1/cmr/m/n on input line 26.
LaTeX Font Info: ... okay on input line 26.
LaTeX Font Info: Checking defaults for TS1/cmr/m/n on input line 26.
LaTeX Font Info: ... okay on input line 26.
LaTeX Font Info: Checking defaults for OMX/cmex/m/n on input line 26.
LaTeX Font Info: ... okay on input line 26.
LaTeX Font Info: Checking defaults for U/cmr/m/n on input line 26.
LaTeX Font Info: ... okay on input line 26.
(/usr/share/texmf-dist/tex/context/base/mkii/supp-pdf.mkii
[Loading MPS to PDF converter (version 2006.09.02).]
\scratchcounter=\count277
\scratchdimen=\dimen150
\scratchbox=\box54
\nofMPsegments=\count278
\nofMParguments=\count279
\everyMPshowfont=\toks22
\MPscratchCnt=\count280
\MPscratchDim=\dimen151
\MPnumerator=\count281
\makeMPintoPDFobject=\count282
\everyMPtoPDFconversion=\toks23
) (/usr/share/texmf-dist/tex/latex/epstopdf-pkg/epstopdf-base.sty
Package: epstopdf-base 2020-01-24 v2.11 Base part for package epstopdf
(/usr/share/texmf-dist/tex/generic/infwarerr/infwarerr.sty
Package: infwarerr 2019/12/03 v1.5 Providing info/warning/error messages (HO)
)
(/usr/share/texmf-dist/tex/latex/grfext/grfext.sty
Package: grfext 2019/12/03 v1.3 Manage graphics extensions (HO)
(/usr/share/texmf-dist/tex/generic/kvdefinekeys/kvdefinekeys.sty
Package: kvdefinekeys 2019-12-19 v1.6 Define keys (HO)
))
(/usr/share/texmf-dist/tex/latex/kvoptions/kvoptions.sty
Package: kvoptions 2020-10-07 v3.14 Key value format for package options (HO)
(/usr/share/texmf-dist/tex/generic/ltxcmds/ltxcmds.sty
Package: ltxcmds 2020-05-10 v1.25 LaTeX kernel commands for general use (HO)
)
(/usr/share/texmf-dist/tex/generic/kvsetkeys/kvsetkeys.sty
Package: kvsetkeys 2019/12/15 v1.18 Key value parser (HO)
))
(/usr/share/texmf-dist/tex/generic/pdftexcmds/pdftexcmds.sty
Package: pdftexcmds 2020-06-27 v0.33 Utility functions of pdfTeX for LuaTeX (HO
)
Package pdftexcmds Info: \pdf@primitive is available.
Package pdftexcmds Info: \pdf@ifprimitive is available.
Package pdftexcmds Info: \pdfdraftmode found.
)
Package epstopdf-base Info: Redefining graphics rule for `.eps' on input line 4
85.
Package grfext Info: Graphics extension search list:
(grfext) [.pdf,.png,.jpg,.mps,.jpeg,.jbig2,.jb2,.PDF,.PNG,.JPG,.JPE
G,.JBIG2,.JB2,.eps]
(grfext) \AppendGraphicsExtensions on input line 504.
(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
e
))
Package caption Info: Begin \AtBeginDocument code.
Package caption Info: float package is loaded.
Package caption Info: End \AtBeginDocument code.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <12> on input line 28.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <8> on input line 28.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <6> on input line 28.
(./Schrick-Noah_CS-7863_Final-Report.toc
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <7> on input line 2.
LaTeX Font Info: External font `cmex10' loaded for size
(Font) <5> on input line 2.
)
\tf@toc=\write3
\openout3 = `Schrick-Noah_CS-7863_Final-Report.toc'.
Overfull \hbox (21.08397pt too wide) in paragraph at lines 33--34
[]\OT1/cmr/m/n/10 To address the rising risks of computing and threats to cyber
security, vulnerability
[]
[1
{/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}]
Overfull \hbox (3.02843pt too wide) in paragraph at lines 35--36
[]\OT1/cmr/m/n/10 Attack graphs begin with a root node that contains all the cu
rrent information
[]
LaTeX Warning: Citation `j_hale_compliance_nodate' on page 2 undefined on input
line 38.
LaTeX Warning: Citation `baloyi_guidelines_2019' on page 2 undefined on input l
ine 38.
LaTeX Warning: Citation `allman_complying_2006' on page 2 undefined on input li
ne 38.
Overfull \hbox (2.19508pt too wide) in paragraph at lines 38--39
[]\OT1/cmr/m/n/10 Compliance graphs are an alternate form of attack graphs, uti
lized specifically
[]
Overfull \hbox (0.79698pt too wide) in paragraph at lines 38--39
\OT1/cmr/m/n/10 for examining compliance and regulation statuses of systems. Li
ke attack graphs,
[]
Overfull \hbox (10.93585pt too wide) in paragraph at lines 40--41
\OT1/cmr/m/n/10 to also examine administrative policies and properties of syste
ms. Since compliance
[]
Overfull \hbox (2.69524pt too wide) in paragraph at lines 40--41
\OT1/cmr/m/n/10 and regulation is broad and can vary by industry and applicatio
n, the information
[]
[2] (./Schrick-Noah_CS-7863_Final-Report.bbl [3]
Overfull \vbox (137.26349pt too high) has occurred while \output is active []
[4]) [5] (./Schrick-Noah_CS-7863_Final-Report.aux)
LaTeX Warning: There were undefined references.
)
Here is how much of TeX's memory you used:
5354 strings out of 478238
96179 string characters out of 5850456
398243 words of memory out of 5000000
23531 multiletter control sequences out of 15000+600000
473860 words of font info for 43 fonts, out of 8000000 for 9000
1141 hyphenation exceptions out of 8191
67i,6n,77p,920b,219s stack positions out of 5000i,500n,10000p,200000b,80000s
</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></usr/share/
texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/texmf-dist/fon
ts/type1/public/amsfonts/cm/cmr10.pfb></usr/share/texmf-dist/fonts/type1/public
/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cm
r17.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmti10.pfb>
Output written on Schrick-Noah_CS-7863_Final-Report.pdf (5 pages, 103964 bytes)
.
PDF statistics:
50 PDF objects out of 1000 (max. 8388607)
30 compressed objects within 1 object stream
0 named destinations out of 1000 (max. 500000)
1 words of extra memory for PDF output out of 10000 (max. 10000000)

Binary file not shown.

View File

@ -0,0 +1,73 @@
\RequirePackage{setspace}
\documentclass{article}
\usepackage{boxedminipage}
\usepackage{graphicx} % Images
\graphicspath{ {./images/} }
\usepackage{subcaption} % Captions on subfigures
\usepackage{algorithm} % Math and Big Oh
\usepackage[noend]{algpseudocode}
\usepackage{ifpdf} % Detect PDF or DVI mode
\usepackage{babel} % Bibliography
\usepackage[utf8]{inputenc}
\usepackage{float}
\usepackage{indentfirst}
\setlength{\parskip}{\baselineskip}
% Table of Contents/Figure Spacing
\usepackage[titles]{tocloft}
\cftsetindents{figure}{0em}{3.5em}
\cftsetindents{table}{0em}{3.5em}
\title{CS 7863: Network Theory Final Project: Compliance Graph Analysis}
\author{Noah Schrick}
\date{May 3, 2022}
\begin{document}
\maketitle
\tableofcontents
\section{Introduction}
\subsection{Attack Graphs}
To address the rising risks of computing and threats to cybersecurity, vulnerability analysis modeling is a technique employed by experts to identify weak points in a system or set of systems. One such modeling approach is to represent the system or set of systems through graphical means, with system information encoded into the nodes and edges of the graph. This modeling approach was first utilized in the 1990s in a format called attack trees, and can be seen through the works of the authors of \cite{phillips_graph-based_1998} and \cite{schneier_modeling_1999}. These attack trees would later be expanded into attack graphs.
Attack graphs begin with a root node that contains all the current information of the system or set of systems. From this initial root state, all assets in the system are examined to see if any single modification can be made, where a modification is typically a change in system policy or security settings. If a modification can be made, an edge is drawn from the previous state to a new state that includes all of the previous state's information, but now reflects the change in the system. This edge is labeled to reflect which change was made to the system. This process is exhaustively repeated, where all system properties are examined, all attack options are fully enumerated, all permutations are examined, and all changes to a system are encoded into their own independent states, where these states are then individually analyzed through the process.
\subsection{Compliance Graphs}
Compliance graphs are an alternate form of attack graphs, utilized specifically for examining compliance and regulation statuses of systems. Like attack graphs, compliance graphs can also be used to determine all ways that systems may fall out of compliance or violate regulations. These graphs are notably useful for cyber-physical systems due to the increased need for compliance. As the authors of \cite{j_hale_compliance_nodate}, \cite{baloyi_guidelines_2019}, and \cite{allman_complying_2006} discuss, cyber-physical systems have seen greater usage, especially in areas such as critical infrastructure and Internet of Things.
The semantics of compliance graphs are similar to that of attack graphs, but with a few differences regarding the information at each state. While security and compliance statuses are related, the information that is analyzed in compliance graphs is focused less on certain security properties, and is expanded to also examine administrative policies and properties of systems. Since compliance and regulation is broad and can vary by industry and application, the information to analyze can range from safety regulations, maintenance compliance, or any other regulatory compliance. However, the graph structure of compliance graphs is identical to that of attack graphs, where edges represent a modification to the systems, and nodes represent all current information in the system.
\subsection{Difficulties of Compliance Graph Analysis}
\section{Related Works}
\section{Experimental Networks}
\section{Centralities}
\subsection{Introduction}
\subsection{Degree}
\subsection{Betweenness}
\subsection{Katz}
\subsection{K-Path Edge}
\subsection{Adapted Page Rank}
\section{Transitive Closure}
\subsection{Introduction}
\subsection{Application}
\section{Dominant Tree}
\subsection{Introduction}
\subsection{Application}
\section{Results and Result Analysis}
\section{Conclusions and Future Work}
\addcontentsline{toc}{section}{Bibliography}
\bibliography{Bibliography}
\bibliographystyle{ieeetr}
\end{document}

View File

@ -0,0 +1,23 @@
\babel@toc {nil}{}\relax
\contentsline {section}{\numberline {1}Introduction}{2}{}%
\contentsline {subsection}{\numberline {1.1}Attack Graphs}{2}{}%
\contentsline {subsection}{\numberline {1.2}Compliance Graphs}{2}{}%
\contentsline {subsection}{\numberline {1.3}Difficulties of Compliance Graph Analysis}{4}{}%
\contentsline {section}{\numberline {2}Related Works}{4}{}%
\contentsline {section}{\numberline {3}Experimental Networks}{4}{}%
\contentsline {section}{\numberline {4}Centralities}{4}{}%
\contentsline {subsection}{\numberline {4.1}Introduction}{4}{}%
\contentsline {subsection}{\numberline {4.2}Degree}{4}{}%
\contentsline {subsection}{\numberline {4.3}Betweenness}{4}{}%
\contentsline {subsection}{\numberline {4.4}Katz}{4}{}%
\contentsline {subsection}{\numberline {4.5}K-Path Edge}{4}{}%
\contentsline {subsection}{\numberline {4.6}Adapted Page Rank}{4}{}%
\contentsline {section}{\numberline {5}Transitive Closure}{4}{}%
\contentsline {subsection}{\numberline {5.1}Introduction}{4}{}%
\contentsline {subsection}{\numberline {5.2}Application}{4}{}%
\contentsline {section}{\numberline {6}Dominant Tree}{4}{}%
\contentsline {subsection}{\numberline {6.1}Introduction}{4}{}%
\contentsline {subsection}{\numberline {6.2}Application}{4}{}%
\contentsline {section}{\numberline {7}Results and Result Analysis}{4}{}%
\contentsline {section}{\numberline {8}Conclusions and Future Work}{4}{}%
\contentsline {section}{Bibliography}{4}{}%