Adding new references and content to Intro
This commit is contained in:
parent
94b3c15cd3
commit
3e3e0f56a4
@ -136,3 +136,77 @@
|
||||
year = {2018},
|
||||
file = {Will_Nichols_Thesis_FINAL_VER:/home/noah/Zotero/storage/8AXSZXJN/Will_Nichols_Thesis_FINAL_VER.pdf:application/pdf},
|
||||
}
|
||||
|
||||
@article{ming_jo,
|
||||
author = {Li, Ming and Hawrylak, Peter and Hale, John},
|
||||
title = {Strategies for Practical Hybrid Attack Graph Generation and Analysis},
|
||||
year = {2021},
|
||||
publisher = {Association for Computing Machinery},
|
||||
address = {New York, NY, USA},
|
||||
issn = {2692-1626},
|
||||
url = {https://doi.org/10.1145/3491257},
|
||||
doi = {10.1145/3491257},
|
||||
abstract = {As an analytical tool in cyber-security, an attack graph (AG) is capable of discovering multi-stage attack vectors on target computer networks. Cyber-physical systems (CPSs) comprise a special type of network that not only contains computing devices but also integrates components that operate in the continuous domain, such as sensors and actuators. Using AGs on CPSs requires that the system models and exploit patterns capture both token- and real-valued information. In this paper, we describe a hybrid AG model for security analysis of CPSs and computer networks. Specifically, we focus on two issues related to applying the model in practice: efficient hybrid AG generation and techniques for information extraction from them. To address the first issue, we present an accelerated hybrid AG generator that employs parallel programming and high performance computing (HPC). We conduct performance tests on CPU and GPU platforms to characterize the efficiency of our parallel algorithms. To address the second issue, we introduce an analytical regimen based on centrality analysis and apply it to a hybrid AG generated for a target CPS system to discover effective vulnerability remediation solutions.},
|
||||
note = {Just Accepted},
|
||||
journal = {Digital Threats},
|
||||
month = {oct},
|
||||
keywords = {cyber-physical system, high performance computing, attack graph, breadth-first search}
|
||||
}
|
||||
|
||||
@inproceedings{CPSIOT,
|
||||
author = {Al Ghazo, Alaa T. and Ibrahim, Mariam and Ren, Hao and Kumar, Ratnesh},
|
||||
title = {A2G2V: Automated Attack Graph Generator and Visualizer},
|
||||
year = {2018},
|
||||
isbn = {9781450358606},
|
||||
publisher = {Association for Computing Machinery},
|
||||
address = {New York, NY, USA},
|
||||
url = {https://doi.org/10.1145/3215466.3215468},
|
||||
doi = {10.1145/3215466.3215468},
|
||||
abstract = {The Internet of Things (IoT) and Cyber-Physical Systems (CPS) technologies have increased the complexity of systems and also exposed them to additional vulnerabilities. Attack-graphs are graphical representations that provide a complete view of how inter-dependencies among atomic vulnerabilities may be exploited by an adversary to stitch together an attack that can compromise the system. Their manual construction is tedious, error-prone, and time consuming. This paper presents a model-based Automated Attack-Graph Generator and Visualizer (A2G2V). Given the networked system description (its components, connectivity, services it supports, their vulnerabilities and protections), the attack graph enlists set of all possible sequences in which atomic-level vulnerabilities can be exploited to compromise a certain system-level security. The proposed A2G2V tool extends an existing formal methods tool (a model-checker) by integrating with it an architecture description tool, our own code (for parsing counterexamples, encoding those for specification relaxation, iterating till all attack sequences are revealed), and also a graph visualization tool.},
|
||||
booktitle = {Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy},
|
||||
articleno = {3},
|
||||
numpages = {6},
|
||||
keywords = {Model Checking, Security, Enumerating Counterexamples, Internet of Things, Attack Graph, Cyber-Physical Systems},
|
||||
location = {Los Angeles, CA, USA},
|
||||
series = {Mobile IoT SSP'18}
|
||||
}
|
||||
|
||||
@article{10.1145/3105760,
|
||||
author = {Mu\~{n}oz-Gonz\'{a}lez, Luis and Sgandurra, Daniele and Paudice, Andrea and Lupu, Emil C.},
|
||||
title = {Efficient Attack Graph Analysis through Approximate Inference},
|
||||
year = {2017},
|
||||
issue_date = {August 2017},
|
||||
publisher = {Association for Computing Machinery},
|
||||
address = {New York, NY, USA},
|
||||
volume = {20},
|
||||
number = {3},
|
||||
issn = {2471-2566},
|
||||
url = {https://doi.org/10.1145/3105760},
|
||||
doi = {10.1145/3105760},
|
||||
abstract = {Attack graphs provide compact representations of the attack paths an attacker can follow to compromise network resources from the analysis of network vulnerabilities and topology. These representations are a powerful tool for security risk assessment. Bayesian inference on attack graphs enables the estimation of the risk of compromise to the system’s components given their vulnerabilities and interconnections and accounts for multi-step attacks spreading through the system. While static analysis considers the risk posture at rest, dynamic analysis also accounts for evidence of compromise, for example, from Security Information and Event Management software or forensic investigation. However, in this context, exact Bayesian inference techniques do not scale well. In this article, we show how Loopy Belief Propagation—an approximate inference technique—can be applied to attack graphs and that it scales linearly in the number of nodes for both static and dynamic analysis, making such analyses viable for larger networks. We experiment with different topologies and network clustering on synthetic Bayesian attack graphs with thousands of nodes to show that the algorithm’s accuracy is acceptable and that it converges to a stable solution. We compare sequential and parallel versions of Loopy Belief Propagation with exact inference techniques for both static and dynamic analysis, showing the advantages and gains of approximate inference techniques when scaling to larger attack graphs.},
|
||||
journal = {ACM Trans. Priv. Secur.},
|
||||
month = {jul},
|
||||
articleno = {10},
|
||||
numpages = {30},
|
||||
keywords = {probabilistic graphical models, approximate inference, Bayesian networks}
|
||||
}
|
||||
|
||||
@ARTICLE{8290918,
|
||||
author={Wang, Huan and Chen, Zhanfang and Zhao, Jianping and Di, Xiaoqiang and Liu, Dan},
|
||||
journal={IEEE Access},
|
||||
title={A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow},
|
||||
year={2018},
|
||||
volume={6},
|
||||
number={},
|
||||
pages={8599-8609},
|
||||
doi={10.1109/ACCESS.2018.2805690}
|
||||
}
|
||||
|
||||
@inproceedings{centrality_based,
|
||||
author = {Gonda, Tom and Pascal, Tal and Puzis, Rami and Shani, Guy and Shapira, Bracha},
|
||||
year = {2018},
|
||||
month = {09},
|
||||
pages = {},
|
||||
title = {Analysis of Attack Graph Representations for Ranking Vulnerability Fixes},
|
||||
doi = {10.29007/2c1q}
|
||||
}
|
||||
@ -21,6 +21,11 @@
|
||||
\citation{phillips_graph-based_1998}
|
||||
\citation{schneier_modeling_1999}
|
||||
\citation{ou_scalable_2006}
|
||||
\citation{CPSIOT}
|
||||
\citation{ming_jo}
|
||||
\citation{10.1145/3105760}
|
||||
\citation{8290918}
|
||||
\citation{centrality_based}
|
||||
\citation{j_hale_compliance_nodate}
|
||||
\citation{baloyi_guidelines_2019}
|
||||
\citation{allman_complying_2006}
|
||||
@ -48,16 +53,15 @@
|
||||
\citation{louthan_hybrid_2011}
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {IV}Implementing Synchronous Firing}{3}{section.4}\protected@file@percent }
|
||||
\newlabel{sec:implementing}{{IV}{3}{Implementing Synchronous Firing}{section.4}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}Base Generator Description}{3}{subsection.4.1}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}GNU Bison and Flex}{3}{subsection.4.2}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-A}}GNU Bison and Flex}{3}{subsection.4.1}\protected@file@percent }
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program}}{3}{figure.2}\protected@file@percent }
|
||||
\newlabel{fig:bison-flex}{{2}{3}{Inclusion of Synchronous Firing into GNU Bison, GNU Flex, and the overall program}{figure.2}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}PostgreSQL}{3}{subsection.4.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-B}}PostgreSQL}{3}{subsection.4.2}\protected@file@percent }
|
||||
\citation{nichols_2018}
|
||||
\citation{cook_rage_2018}
|
||||
\citation{cook_rage_2018}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}Compound Operators}{4}{subsection.4.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-E}}Graph Generation}{4}{subsection.4.5}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-C}}Compound Operators}{4}{subsection.4.3}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {IV-D}}Graph Generation}{4}{subsection.4.4}\protected@file@percent }
|
||||
\@writefile{toc}{\contentsline {section}{\numberline {V}Results}{4}{section.5}\protected@file@percent }
|
||||
\newlabel{sec:Results}{{V}{4}{Results}{section.5}{}}
|
||||
\@writefile{toc}{\contentsline {subsection}{\numberline {\mbox {V-A}}Experimental Networks and Computing Platform}{4}{subsection.5.1}\protected@file@percent }
|
||||
@ -92,16 +96,21 @@
|
||||
\bibcite{phillips_graph-based_1998}{1}
|
||||
\bibcite{schneier_modeling_1999}{2}
|
||||
\bibcite{ou_scalable_2006}{3}
|
||||
\bibcite{j_hale_compliance_nodate}{4}
|
||||
\bibcite{baloyi_guidelines_2019}{5}
|
||||
\bibcite{allman_complying_2006}{6}
|
||||
\bibcite{sheyner_automated_2002}{7}
|
||||
\bibcite{zhang_boosting_2017}{8}
|
||||
\bibcite{Monotonicity}{9}
|
||||
\bibcite{TVA}{10}
|
||||
\bibcite{louthan_hybrid_2011}{11}
|
||||
\bibcite{cook_rage_2018}{12}
|
||||
\bibcite{nichols_2018}{13}
|
||||
\bibcite{CPSIOT}{4}
|
||||
\bibcite{ming_jo}{5}
|
||||
\bibcite{10.1145/3105760}{6}
|
||||
\bibcite{8290918}{7}
|
||||
\bibcite{centrality_based}{8}
|
||||
\bibcite{j_hale_compliance_nodate}{9}
|
||||
\bibcite{baloyi_guidelines_2019}{10}
|
||||
\bibcite{allman_complying_2006}{11}
|
||||
\bibcite{sheyner_automated_2002}{12}
|
||||
\bibcite{zhang_boosting_2017}{13}
|
||||
\bibcite{Monotonicity}{14}
|
||||
\bibcite{TVA}{15}
|
||||
\bibcite{louthan_hybrid_2011}{16}
|
||||
\bibcite{cook_rage_2018}{17}
|
||||
\bibcite{nichols_2018}{18}
|
||||
\bibstyle{ieeetr}
|
||||
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces Speedup (Amdahl's) Obtained When Using Synchronous Firing with Comprehensive Services}}{8}{figure.9}\protected@file@percent }
|
||||
\newlabel{fig:Comp-Sync-Spd}{{9}{8}{Speedup (Amdahl's) Obtained When Using Synchronous Firing with Comprehensive Services}{figure.9}{}}
|
||||
|
||||
@ -15,6 +15,31 @@ X.~Ou, W.~F. Boyer, and M.~A. Mcqueen, ``A {Scalable} {Approach} to {Attack}
|
||||
{Graph} {Generation},'' {\em CCS '06: Proceedings of the 13th ACM conference
|
||||
on Computer and communications security}, pp.~336--345, 2006.
|
||||
|
||||
\bibitem{CPSIOT}
|
||||
A.~T. Al~Ghazo, M.~Ibrahim, H.~Ren, and R.~Kumar, ``A2g2v: Automated attack
|
||||
graph generator and visualizer,'' in {\em Proceedings of the 1st ACM MobiHoc
|
||||
Workshop on Mobile IoT Sensing, Security, and Privacy}, Mobile IoT SSP'18,
|
||||
(New York, NY, USA), Association for Computing Machinery, 2018.
|
||||
|
||||
\bibitem{ming_jo}
|
||||
M.~Li, P.~Hawrylak, and J.~Hale, ``Strategies for practical hybrid attack graph
|
||||
generation and analysis,'' {\em Digital Threats}, oct 2021.
|
||||
\newblock Just Accepted.
|
||||
|
||||
\bibitem{10.1145/3105760}
|
||||
L.~Mu\~{n}oz Gonz\'{a}lez, D.~Sgandurra, A.~Paudice, and E.~C. Lupu,
|
||||
``Efficient attack graph analysis through approximate inference,'' {\em ACM
|
||||
Trans. Priv. Secur.}, vol.~20, jul 2017.
|
||||
|
||||
\bibitem{8290918}
|
||||
H.~Wang, Z.~Chen, J.~Zhao, X.~Di, and D.~Liu, ``A vulnerability assessment
|
||||
method in industrial internet of things based on attack graph and maximum
|
||||
flow,'' {\em IEEE Access}, vol.~6, pp.~8599--8609, 2018.
|
||||
|
||||
\bibitem{centrality_based}
|
||||
T.~Gonda, T.~Pascal, R.~Puzis, G.~Shani, and B.~Shapira, ``Analysis of attack
|
||||
graph representations for ranking vulnerability fixes,'' 09 2018.
|
||||
|
||||
\bibitem{j_hale_compliance_nodate}
|
||||
{J. Hale}, P.~Hawrylak, and M.~Papa, ``Compliance {Method} for a
|
||||
{Cyber}-{Physical} {System}.''
|
||||
|
||||
@ -3,46 +3,47 @@ Capacity: max_strings=200000, hash_size=200000, hash_prime=170003
|
||||
The top-level auxiliary file: Schrick-Noah_AG-CG-SyncFire.aux
|
||||
The style file: ieeetr.bst
|
||||
Database file #1: Bibliography.bib
|
||||
Warning--empty booktitle in centrality_based
|
||||
Warning--empty publisher in TVA
|
||||
You've used 13 entries,
|
||||
You've used 18 entries,
|
||||
1876 wiz_defined-function locations,
|
||||
555 strings with 5973 characters,
|
||||
and the built_in function-call counts, 3087 in all, are:
|
||||
= -- 322
|
||||
> -- 105
|
||||
581 strings with 6930 characters,
|
||||
and the built_in function-call counts, 4246 in all, are:
|
||||
= -- 415
|
||||
> -- 178
|
||||
< -- 0
|
||||
+ -- 41
|
||||
- -- 28
|
||||
* -- 187
|
||||
:= -- 442
|
||||
add.period$ -- 19
|
||||
call.type$ -- 13
|
||||
change.case$ -- 9
|
||||
+ -- 67
|
||||
- -- 49
|
||||
* -- 286
|
||||
:= -- 624
|
||||
add.period$ -- 25
|
||||
call.type$ -- 18
|
||||
change.case$ -- 14
|
||||
chr.to.int$ -- 0
|
||||
cite$ -- 14
|
||||
duplicate$ -- 170
|
||||
empty$ -- 296
|
||||
format.name$ -- 28
|
||||
if$ -- 760
|
||||
cite$ -- 20
|
||||
duplicate$ -- 230
|
||||
empty$ -- 405
|
||||
format.name$ -- 49
|
||||
if$ -- 1028
|
||||
int.to.chr$ -- 0
|
||||
int.to.str$ -- 13
|
||||
missing$ -- 10
|
||||
newline$ -- 49
|
||||
num.names$ -- 13
|
||||
pop$ -- 45
|
||||
int.to.str$ -- 18
|
||||
missing$ -- 15
|
||||
newline$ -- 65
|
||||
num.names$ -- 18
|
||||
pop$ -- 64
|
||||
preamble$ -- 1
|
||||
purify$ -- 0
|
||||
quote$ -- 0
|
||||
skip$ -- 113
|
||||
skip$ -- 138
|
||||
stack$ -- 0
|
||||
substring$ -- 166
|
||||
swap$ -- 68
|
||||
substring$ -- 202
|
||||
swap$ -- 82
|
||||
text.length$ -- 0
|
||||
text.prefix$ -- 0
|
||||
top$ -- 0
|
||||
type$ -- 0
|
||||
warning$ -- 1
|
||||
while$ -- 28
|
||||
width$ -- 15
|
||||
write$ -- 131
|
||||
(There was 1 warning)
|
||||
warning$ -- 2
|
||||
while$ -- 35
|
||||
width$ -- 20
|
||||
write$ -- 178
|
||||
(There were 2 warnings)
|
||||
|
||||
@ -1,4 +1,4 @@
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 11 OCT 2022 10:52
|
||||
This is pdfTeX, Version 3.141592653-2.6-1.40.24 (TeX Live 2022/Arch Linux) (preloaded format=pdflatex 2022.4.29) 11 OCT 2022 11:57
|
||||
entering extended mode
|
||||
restricted \write18 enabled.
|
||||
%&-line parsing enabled.
|
||||
@ -527,7 +527,7 @@ Underfull \hbox (badness 1394) in paragraph at lines 81--86
|
||||
\OT1/ptm/m/n/10 and group features, and grouped exploits could not be
|
||||
[]
|
||||
|
||||
<./images/non-sync_ex.drawio.png, id=109, 1014.79124pt x 400.49625pt>
|
||||
<./images/non-sync_ex.drawio.png, id=114, 1014.79124pt x 400.49625pt>
|
||||
File: ./images/non-sync_ex.drawio.png Graphic file (type png)
|
||||
<use ./images/non-sync_ex.drawio.png>
|
||||
Package pdftex.def Info: ./images/non-sync_ex.drawio.png used on input line 96
|
||||
@ -535,148 +535,152 @@ Package pdftex.def Info: ./images/non-sync_ex.drawio.png used on input line 96
|
||||
(pdftex.def) Requested size: 252.0pt x 99.4516pt.
|
||||
[2 <./images/non-sync_ex.drawio.png>]
|
||||
LaTeX Font Info: Trying to load font information for OT1+pcr on input line 1
|
||||
13.
|
||||
12.
|
||||
|
||||
(/usr/share/texmf-dist/tex/latex/psnfss/ot1pcr.fd
|
||||
File: ot1pcr.fd 2001/06/04 font definitions for OT1/pcr.
|
||||
)
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 115--119
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 114--118
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 120--124
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 119--123
|
||||
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 125--131
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 124--130
|
||||
|
||||
[]
|
||||
|
||||
<./images/vert_Bison-Flex.drawio.png, id=130, 551.05875pt x 710.655pt>
|
||||
<./images/vert_Bison-Flex.drawio.png, id=136, 551.05875pt x 710.655pt>
|
||||
File: ./images/vert_Bison-Flex.drawio.png Graphic file (type png)
|
||||
<use ./images/vert_Bison-Flex.drawio.png>
|
||||
Package pdftex.def Info: ./images/vert_Bison-Flex.drawio.png used on input lin
|
||||
e 133.
|
||||
e 132.
|
||||
(pdftex.def) Requested size: 252.0pt x 324.98593pt.
|
||||
[3 <./images/vert_Bison-Flex.drawio.png>]
|
||||
Underfull \hbox (badness 2205) in paragraph at lines 145--148
|
||||
Underfull \hbox (badness 2205) in paragraph at lines 144--147
|
||||
[]\OT1/ptm/m/n/10 Many of the graphs previously generated by RAGE
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 2351) in paragraph at lines 145--148
|
||||
Underfull \hbox (badness 2351) in paragraph at lines 144--147
|
||||
\OML/cmm/m/it/10 true=false\OT1/cmr/m/n/10 "$\OT1/ptm/m/n/10 , $\OT1/cmr/m/n/10
|
||||
\\OML/cmm/m/it/10 root \OT1/cmr/m/n/10 = \OML/cmm/m/it/10 true=false\OT1/cmr/m
|
||||
/n/10 "$\OT1/ptm/m/n/10 , or other general
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1895) in paragraph at lines 155--156
|
||||
Underfull \hbox (badness 1895) in paragraph at lines 154--155
|
||||
[]\OT1/ptm/m/n/10 Other changes involved updating classes (namely the
|
||||
[]
|
||||
|
||||
<./images/Sync-Fire.png, id=143, 489.83pt x 1053.9375pt>
|
||||
<./images/Sync-Fire.png, id=149, 489.83pt x 1053.9375pt>
|
||||
File: ./images/Sync-Fire.png Graphic file (type png)
|
||||
<use ./images/Sync-Fire.png>
|
||||
Package pdftex.def Info: ./images/Sync-Fire.png used on input line 162.
|
||||
Package pdftex.def Info: ./images/Sync-Fire.png used on input line 161.
|
||||
(pdftex.def) Requested size: 244.9144pt x 526.96747pt.
|
||||
|
||||
Underfull \hbox (badness 7451) in paragraph at lines 180--181
|
||||
Underfull \hbox (badness 7451) in paragraph at lines 179--180
|
||||
\OT1/ptm/m/n/10 All nodes are connected with a 10Gbps Infiniband
|
||||
[]
|
||||
|
||||
[4] [5 <./images/Sync-Fire.png>]
|
||||
<./images/Sync-Runtime-Bar.png, id=170, 602.25pt x 238.491pt>
|
||||
<./images/Sync-Runtime-Bar.png, id=176, 602.25pt x 238.491pt>
|
||||
File: ./images/Sync-Runtime-Bar.png Graphic file (type png)
|
||||
<use ./images/Sync-Runtime-Bar.png>
|
||||
Package pdftex.def Info: ./images/Sync-Runtime-Bar.png used on input line 216.
|
||||
Package pdftex.def Info: ./images/Sync-Runtime-Bar.png used on input line 215.
|
||||
|
||||
(pdftex.def) Requested size: 252.0pt x 99.7907pt.
|
||||
<./images/Sync-Runtime.png, id=171, 549.69pt x 236.301pt>
|
||||
<./images/Sync-Runtime.png, id=177, 549.69pt x 236.301pt>
|
||||
File: ./images/Sync-Runtime.png Graphic file (type png)
|
||||
<use ./images/Sync-Runtime.png>
|
||||
Package pdftex.def Info: ./images/Sync-Runtime.png used on input line 217.
|
||||
Package pdftex.def Info: ./images/Sync-Runtime.png used on input line 216.
|
||||
(pdftex.def) Requested size: 252.0pt x 108.32838pt.
|
||||
<./images/Sync-StateSpace-Bar.png, id=172, 608.163pt x 223.38pt>
|
||||
<./images/Sync-StateSpace-Bar.png, id=178, 608.163pt x 223.38pt>
|
||||
File: ./images/Sync-StateSpace-Bar.png Graphic file (type png)
|
||||
<use ./images/Sync-StateSpace-Bar.png>
|
||||
Package pdftex.def Info: ./images/Sync-StateSpace-Bar.png used on input line 2
|
||||
24.
|
||||
23.
|
||||
(pdftex.def) Requested size: 252.0pt x 92.5578pt.
|
||||
<./images/Sync-StateSpace.png, id=173, 557.574pt x 229.512pt>
|
||||
<./images/Sync-StateSpace.png, id=179, 557.574pt x 229.512pt>
|
||||
File: ./images/Sync-StateSpace.png Graphic file (type png)
|
||||
<use ./images/Sync-StateSpace.png>
|
||||
Package pdftex.def Info: ./images/Sync-StateSpace.png used on input line 225.
|
||||
Package pdftex.def Info: ./images/Sync-StateSpace.png used on input line 224.
|
||||
(pdftex.def) Requested size: 252.0pt x 103.7312pt.
|
||||
<./images/Sync_Speedup.png, id=174, 533.265pt x 236.301pt>
|
||||
<./images/Sync_Speedup.png, id=180, 533.265pt x 236.301pt>
|
||||
File: ./images/Sync_Speedup.png Graphic file (type png)
|
||||
<use ./images/Sync_Speedup.png>
|
||||
Package pdftex.def Info: ./images/Sync_Speedup.png used on input line 232.
|
||||
Package pdftex.def Info: ./images/Sync_Speedup.png used on input line 231.
|
||||
(pdftex.def) Requested size: 252.0pt x 111.66722pt.
|
||||
|
||||
Underfull \hbox (badness 2245) in paragraph at lines 284--285
|
||||
Underfull \hbox (badness 2245) in paragraph at lines 283--284
|
||||
\OT1/ptm/m/n/10 and resulting graphs presented in Section [][][]1[][] depict
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 2173) in paragraph at lines 290--291
|
||||
Underfull \hbox (badness 2173) in paragraph at lines 289--290
|
||||
\OT1/ptm/m/n/10 in state space and an improvement in runtime. When
|
||||
[]
|
||||
|
||||
[6 <./images/Sync-Runtime-Bar.png> <./images/Sync-Runtime.png> <./images/Sync-S
|
||||
tateSpace-Bar.png> <./images/Sync-StateSpace.png> <./images/Sync_Speedup.png>]
|
||||
<./images/Comp-Sync-Runtime-Bar.png, id=190, 602.25pt x 238.491pt>
|
||||
<./images/Comp-Sync-Runtime-Bar.png, id=196, 602.25pt x 238.491pt>
|
||||
File: ./images/Comp-Sync-Runtime-Bar.png Graphic file (type png)
|
||||
<use ./images/Comp-Sync-Runtime-Bar.png>
|
||||
Package pdftex.def Info: ./images/Comp-Sync-Runtime-Bar.png used on input line
|
||||
341.
|
||||
340.
|
||||
(pdftex.def) Requested size: 252.0pt x 99.7907pt.
|
||||
<./images/Comp-Sync-Runtime.png, id=191, 549.69pt x 236.301pt>
|
||||
<./images/Comp-Sync-Runtime.png, id=197, 549.69pt x 236.301pt>
|
||||
File: ./images/Comp-Sync-Runtime.png Graphic file (type png)
|
||||
<use ./images/Comp-Sync-Runtime.png>
|
||||
Package pdftex.def Info: ./images/Comp-Sync-Runtime.png used on input line 342
|
||||
Package pdftex.def Info: ./images/Comp-Sync-Runtime.png used on input line 341
|
||||
.
|
||||
(pdftex.def) Requested size: 252.0pt x 108.32838pt.
|
||||
<./images/Comp-Sync-StateSpace-Bar.png, id=192, 600.717pt x 230.607pt>
|
||||
<./images/Comp-Sync-StateSpace-Bar.png, id=198, 600.717pt x 230.607pt>
|
||||
File: ./images/Comp-Sync-StateSpace-Bar.png Graphic file (type png)
|
||||
<use ./images/Comp-Sync-StateSpace-Bar.png>
|
||||
Package pdftex.def Info: ./images/Comp-Sync-StateSpace-Bar.png used on input l
|
||||
ine 349.
|
||||
ine 348.
|
||||
(pdftex.def) Requested size: 252.0pt x 96.73814pt.
|
||||
<./images/Comp-Sync-StateSpace.png, id=193, 532.17pt x 236.739pt>
|
||||
<./images/Comp-Sync-StateSpace.png, id=199, 532.17pt x 236.739pt>
|
||||
File: ./images/Comp-Sync-StateSpace.png Graphic file (type png)
|
||||
<use ./images/Comp-Sync-StateSpace.png>
|
||||
Package pdftex.def Info: ./images/Comp-Sync-StateSpace.png used on input line
|
||||
350.
|
||||
349.
|
||||
(pdftex.def) Requested size: 252.0pt x 112.1054pt.
|
||||
<./images/Comp-Sync_Speedup.png, id=194, 533.265pt x 236.301pt>
|
||||
<./images/Comp-Sync_Speedup.png, id=200, 533.265pt x 236.301pt>
|
||||
File: ./images/Comp-Sync_Speedup.png Graphic file (type png)
|
||||
<use ./images/Comp-Sync_Speedup.png>
|
||||
Package pdftex.def Info: ./images/Comp-Sync_Speedup.png used on input line 357
|
||||
Package pdftex.def Info: ./images/Comp-Sync_Speedup.png used on input line 356
|
||||
.
|
||||
(pdftex.def) Requested size: 252.0pt x 111.66722pt.
|
||||
|
||||
Underfull \hbox (badness 2277) in paragraph at lines 365--366
|
||||
Underfull \hbox (badness 2277) in paragraph at lines 364--365
|
||||
\OT1/ptm/m/n/10 reduction due to the increased number of unattainable
|
||||
[]
|
||||
|
||||
[7 <./images/Comp-Sync-Runtime-Bar.png> <./images/Comp-Sync-Runtime.png> <./ima
|
||||
ges/Comp-Sync-StateSpace-Bar.png> <./images/Comp-Sync-StateSpace.png>]
|
||||
Underfull \hbox (badness 10000) in paragraph at lines 368--369
|
||||
[]\OT1/ptm/m/n/10 Introducing service heuristics could improve the
|
||||
[]
|
||||
|
||||
(./Schrick-Noah_AG-CG-SyncFire.bbl
|
||||
Underfull \hbox (badness 1442) in paragraph at lines 24--29
|
||||
Underfull \hbox (badness 1442) in paragraph at lines 49--54
|
||||
\OT1/ptm/m/n/8 A Focus on Cyberphysical Systems and Internet of Things,'' in
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1708) in paragraph at lines 46--50
|
||||
Underfull \hbox (badness 1708) in paragraph at lines 71--75
|
||||
\OT1/ptm/m/n/8 network vulnerability analysis,'' in \OT1/ptm/m/it/8 Proceedings
|
||||
of the 9th ACM
|
||||
[]
|
||||
|
||||
|
||||
Underfull \hbox (badness 1565) in paragraph at lines 57--60
|
||||
Underfull \hbox (badness 1565) in paragraph at lines 82--85
|
||||
[]\OT1/ptm/m/n/8 G. Louthan, \OT1/ptm/m/it/8 Hybrid Attack Graphs for Modeling
|
||||
Cyber-Physical
|
||||
[]
|
||||
@ -696,13 +700,13 @@ Before submitting the final camera ready copy, remember to:
|
||||
[8 <./images/Comp-Sync_Speedup.png>] (./Schrick-Noah_AG-CG-SyncFire.aux)
|
||||
Package rerunfilecheck Info: File `Schrick-Noah_AG-CG-SyncFire.out' has not cha
|
||||
nged.
|
||||
(rerunfilecheck) Checksum: 1C5501F0659DD1A843CB52115FE74CFE;2654.
|
||||
(rerunfilecheck) Checksum: E85A8F1655CAD9A16113AB5056440CB9;2460.
|
||||
)
|
||||
Here is how much of TeX's memory you used:
|
||||
12181 strings out of 478238
|
||||
194261 string characters out of 5850456
|
||||
521860 words of memory out of 5000000
|
||||
30185 multiletter control sequences out of 15000+600000
|
||||
12190 strings out of 478238
|
||||
194376 string characters out of 5850456
|
||||
522026 words of memory out of 5000000
|
||||
30190 multiletter control sequences out of 15000+600000
|
||||
507907 words of font info for 102 fonts, out of 8000000 for 9000
|
||||
1141 hyphenation exceptions out of 8191
|
||||
60i,14n,63p,1233b,387s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||
@ -715,10 +719,10 @@ t/fonts/type1/urw/courier/ucrr8a.pfb></usr/share/texmf-dist/fonts/type1/urw/tim
|
||||
es/utmb8a.pfb></usr/share/texmf-dist/fonts/type1/urw/times/utmbi8a.pfb></usr/sh
|
||||
are/texmf-dist/fonts/type1/urw/times/utmr8a.pfb></usr/share/texmf-dist/fonts/ty
|
||||
pe1/urw/times/utmri8a.pfb>
|
||||
Output written on Schrick-Noah_AG-CG-SyncFire.pdf (8 pages, 907822 bytes).
|
||||
Output written on Schrick-Noah_AG-CG-SyncFire.pdf (8 pages, 909764 bytes).
|
||||
PDF statistics:
|
||||
275 PDF objects out of 1000 (max. 8388607)
|
||||
216 compressed objects within 3 object streams
|
||||
52 named destinations out of 1000 (max. 500000)
|
||||
202 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
282 PDF objects out of 1000 (max. 8388607)
|
||||
223 compressed objects within 3 object streams
|
||||
56 named destinations out of 1000 (max. 500000)
|
||||
194 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||
|
||||
|
||||
@ -2,16 +2,15 @@
|
||||
\BOOKMARK [1][-]{section.2}{\376\377\000R\000e\000l\000a\000t\000e\000d\000\040\000W\000o\000r\000k}{}% 2
|
||||
\BOOKMARK [1][-]{section.3}{\376\377\000I\000n\000s\000e\000p\000a\000r\000a\000b\000l\000e\000\040\000F\000e\000a\000t\000u\000r\000e\000s}{}% 3
|
||||
\BOOKMARK [1][-]{section.4}{\376\377\000I\000m\000p\000l\000e\000m\000e\000n\000t\000i\000n\000g\000\040\000S\000y\000n\000c\000h\000r\000o\000n\000o\000u\000s\000\040\000F\000i\000r\000i\000n\000g}{}% 4
|
||||
\BOOKMARK [2][-]{subsection.4.1}{\376\377\000B\000a\000s\000e\000\040\000G\000e\000n\000e\000r\000a\000t\000o\000r\000\040\000D\000e\000s\000c\000r\000i\000p\000t\000i\000o\000n}{section.4}% 5
|
||||
\BOOKMARK [2][-]{subsection.4.2}{\376\377\000G\000N\000U\000\040\000B\000i\000s\000o\000n\000\040\000a\000n\000d\000\040\000F\000l\000e\000x}{section.4}% 6
|
||||
\BOOKMARK [2][-]{subsection.4.3}{\376\377\000P\000o\000s\000t\000g\000r\000e\000S\000Q\000L}{section.4}% 7
|
||||
\BOOKMARK [2][-]{subsection.4.4}{\376\377\000C\000o\000m\000p\000o\000u\000n\000d\000\040\000O\000p\000e\000r\000a\000t\000o\000r\000s}{section.4}% 8
|
||||
\BOOKMARK [2][-]{subsection.4.5}{\376\377\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n}{section.4}% 9
|
||||
\BOOKMARK [1][-]{section.5}{\376\377\000R\000e\000s\000u\000l\000t\000s}{}% 10
|
||||
\BOOKMARK [2][-]{subsection.5.1}{\376\377\000E\000x\000p\000e\000r\000i\000m\000e\000n\000t\000a\000l\000\040\000N\000e\000t\000w\000o\000r\000k\000s\000\040\000a\000n\000d\000\040\000C\000o\000m\000p\000u\000t\000i\000n\000g\000\040\000P\000l\000a\000t\000f\000o\000r\000m}{section.5}% 11
|
||||
\BOOKMARK [2][-]{subsection.5.2}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000a\000n\000d\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.5}% 12
|
||||
\BOOKMARK [3][-]{subsubsection.5.2.1}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000f\000o\000r\000\040\000t\000h\000e\000\040\000T\000h\000e\000o\000r\000e\000t\000i\000c\000a\000l\000\040\000E\000n\000v\000i\000r\000o\000n\000m\000e\000n\000t}{subsection.5.2}% 13
|
||||
\BOOKMARK [3][-]{subsubsection.5.2.2}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000f\000o\000r\000\040\000a\000\040\000G\000r\000o\000u\000p\000e\000d\000\040\000E\000n\000v\000i\000r\000o\000n\000m\000e\000n\000t}{subsection.5.2}% 14
|
||||
\BOOKMARK [1][-]{section.6}{\376\377\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k\000s}{}% 15
|
||||
\BOOKMARK [1][-]{section.7}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n}{}% 16
|
||||
\BOOKMARK [1][-]{section*.1}{\376\377\000R\000e\000f\000e\000r\000e\000n\000c\000e\000s}{}% 17
|
||||
\BOOKMARK [2][-]{subsection.4.1}{\376\377\000G\000N\000U\000\040\000B\000i\000s\000o\000n\000\040\000a\000n\000d\000\040\000F\000l\000e\000x}{section.4}% 5
|
||||
\BOOKMARK [2][-]{subsection.4.2}{\376\377\000P\000o\000s\000t\000g\000r\000e\000S\000Q\000L}{section.4}% 6
|
||||
\BOOKMARK [2][-]{subsection.4.3}{\376\377\000C\000o\000m\000p\000o\000u\000n\000d\000\040\000O\000p\000e\000r\000a\000t\000o\000r\000s}{section.4}% 7
|
||||
\BOOKMARK [2][-]{subsection.4.4}{\376\377\000G\000r\000a\000p\000h\000\040\000G\000e\000n\000e\000r\000a\000t\000i\000o\000n}{section.4}% 8
|
||||
\BOOKMARK [1][-]{section.5}{\376\377\000R\000e\000s\000u\000l\000t\000s}{}% 9
|
||||
\BOOKMARK [2][-]{subsection.5.1}{\376\377\000E\000x\000p\000e\000r\000i\000m\000e\000n\000t\000a\000l\000\040\000N\000e\000t\000w\000o\000r\000k\000s\000\040\000a\000n\000d\000\040\000C\000o\000m\000p\000u\000t\000i\000n\000g\000\040\000P\000l\000a\000t\000f\000o\000r\000m}{section.5}% 10
|
||||
\BOOKMARK [2][-]{subsection.5.2}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000a\000n\000d\000\040\000A\000n\000a\000l\000y\000s\000i\000s}{section.5}% 11
|
||||
\BOOKMARK [3][-]{subsubsection.5.2.1}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000f\000o\000r\000\040\000t\000h\000e\000\040\000T\000h\000e\000o\000r\000e\000t\000i\000c\000a\000l\000\040\000E\000n\000v\000i\000r\000o\000n\000m\000e\000n\000t}{subsection.5.2}% 12
|
||||
\BOOKMARK [3][-]{subsubsection.5.2.2}{\376\377\000R\000e\000s\000u\000l\000t\000s\000\040\000f\000o\000r\000\040\000a\000\040\000G\000r\000o\000u\000p\000e\000d\000\040\000E\000n\000v\000i\000r\000o\000n\000m\000e\000n\000t}{subsection.5.2}% 13
|
||||
\BOOKMARK [1][-]{section.6}{\376\377\000F\000u\000t\000u\000r\000e\000\040\000W\000o\000r\000k\000s}{}% 14
|
||||
\BOOKMARK [1][-]{section.7}{\376\377\000C\000o\000n\000c\000l\000u\000s\000i\000o\000n}{}% 15
|
||||
\BOOKMARK [1][-]{section*.1}{\376\377\000R\000e\000f\000e\000r\000e\000n\000c\000e\000s}{}% 16
|
||||
|
||||
Binary file not shown.
@ -63,10 +63,10 @@ Attack Graph; Compliance Graph; Synchronous Firing; High-Performance Computing;
|
||||
\section{Introduction}
|
||||
Cybersecurity has been at the forefront of computing for decades, and vulnerability analysis modeling has been utilized to mitigate threats to aid in this effort. One such modeling approach is to represent a system or a set of systems through graphical means, and encode information into the nodes and edges of the graph. Even as early as the late 1990s, experts have composed various graphical models to map devices and vulnerabilities through attack trees, and this work can be seen through the works published by the authors of \cite{phillips_graph-based_1998}.
|
||||
This work, and other attack tree discussions of this time such as that conducted by the author of \cite{schneier_modeling_1999}, would later be referred to as early versions of modern-day attack graphs \cite{ou_scalable_2006}.
|
||||
By utilizing this graphical approach, cybersecurity postures can be measured at a system's current status, as well as hypothesize and examine other postures based on system changes over time.
|
||||
By utilizing this graphical approach, cybersecurity postures can be measured at a system's current status, as well as hypothesize and examine other postures based on system changes over time. Attack graphs have also been extended to Cyber-Physical Systems (CPS) and the Internet of Things (IoT), and their usage can be seen in works such as that presented by the authors of \cite{CPSIOT} and the authors of \cite{ming_jo}. Various analysis metrics can then be performed, such as Bayesian attack graphs \cite{10.1145/3105760}, maximum flow \cite{8290918}, and centrality-based ranking measures \cite{centrality_based}.
|
||||
|
||||
As an alternative to attack graphs for examining vulnerable states and measuring cybersecurity postures, the focus can be narrowed to generate graphs with the purpose of examining compliance or regulation statuses. These graphs are known as compliance graphs.
|
||||
Compliance graphs can be especially useful for cyber-physical systems, where a greater need for compliance exists. As the authors of \cite{j_hale_compliance_nodate}, \cite{baloyi_guidelines_2019}, and \cite{allman_complying_2006} discuss, cyber-physical systems have seen greater usage, especially in areas such as critical infrastructure and Internet of Things. The challenge of
|
||||
Compliance graphs can be especially useful for cyber-physical systems, where a greater need for compliance exists. As the authors of \cite{j_hale_compliance_nodate}, \cite{baloyi_guidelines_2019}, and \cite{allman_complying_2006} discuss, cyber-physical systems have seen greater usage, especially in areas such as critical infrastructure and IoT. The challenge of
|
||||
cyber-physical systems lies not only in the demand for cybersecurity of these systems, but also the concern for safe, stable, and undamaged equipment.
|
||||
The industry in which these devices are used can lead to additional compliance guidelines that must be followed, increasing the complexity required for examining compliance statuses. Compliance graphs are promising tools that can aid in minimizing the overhead caused by these systems and the regulations they must follow.
|
||||
|
||||
@ -103,7 +103,6 @@ Post-processing is one option at removing the unattainable states. This process
|
||||
Instead, a new feature called synchronous firing can be used to prevent the generation of these states. The goal of the synchronous firing feature is to prevent the generation of unattainable states, while also not incurring a greater computational cost. Section \ref{sec:implementing} will discuss the development of this feature, and Section \ref{sec:Results} will examine the results when using this feature in applicable networks.
|
||||
|
||||
\section{Implementing Synchronous Firing} \label{sec:implementing}
|
||||
\subsection{Base Generator Description}
|
||||
For the implementation of the synchronous firing feature, there were four primary changes and additions that were necessary. The first is a change in the lexical analyzer, the second involves multiple changes to PostgreSQL, the third is the implementation of compound operators, and lastly is a change in the graph generation process. This Section will consist of subsections discussing the development of these four alterations.
|
||||
|
||||
\subsection{GNU Bison and Flex}
|
||||
@ -366,6 +365,8 @@ As seen and discussed in Section \ref{sec:inseparable}, when unattainable states
|
||||
|
||||
Another avenue for future works would be to take a network science approach. There may be features of interest from examining the topology of the resulting graphs with and without synchronous firing. Various centrality metrics could be examined, as well as examining transformations such as dominant trees or transitive closures derived from the original graphs. Each approach could compare each graph when using or not using synchronous firing to determine if there are possible points of interest. Taking a network science approach could also examine and analyze the E/S Ratio differences between the graphs when using or not using synchronous firing, and attempt to provide further insight on what those differences mean in terms of usability of the graphs.
|
||||
|
||||
Introducing service heuristics could improve the characteristics of synchronous firing. If services are performed too early, then additional states would be generated in the resulting graph. If synchronous firing was not used, these additional states could compound into more states due to the separation of features. Likewise, if services are performed too late, then additional states could be generated to represent the compliance violation, and these states may also compound into more statues without synchronous firing. Examining the impact of synchronous firing when various heuristics are implemented could reveal interesting results.
|
||||
|
||||
\section{Conclusion}
|
||||
This work implemented a state space explosion mitigation technique called synchronous firing. This feature is able to fire exploits simultaneously among a group of assets through a single state transition. By firing exploits across multiple assets, it is able to prevent the separation of features that should normally be inseparable (such as time), and successfully reduces the number of total states in the resulting attack or compliance graph. This feature does not alter the procedure of the generation process in a way that undermines the integrity of the resulting attack or compliance graph, and only groups assets through defined inseparable features. This feature is also toggleable, and the generation process seen in Figure \ref{fig:sync-fire} does not change if the feature is disabled. This feature successfully reduced the total number of states, reduced the runtime of the generation process, and can lead to a reduced analysis process due to a smaller resulting graph.
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user