Quantitatively Assessing and Visualising Industrial System Attack Surfaces
Quantitatively Assessing and Visualising Industrial System Attack Surfaces
Quantitatively Assessing and Visualising Industrial System Attack Surfaces
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CHAPTER 2. METHODOLOGY 29<br />
Figure 2.3: Vulnerable node information within visualisation<br />
result for later use. We pickle these results so that we do not exceed Google’s daily request<br />
limit of 5000 queries, but also because there are often repetitions. For example we found<br />
over 200 results in The Hague, <strong>and</strong> there is no need to repeat these location queries.<br />
At the end of a run of our code the city cache is pickled (saved to disc), for future use<br />
when we run another week of queries. This cache data will not alter between runs <strong>and</strong><br />
each city geocoding query should only be run once. This is in contrast to our exploit<br />
queries, which are cached on a session-only basis.