21.03.2013 Views

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

Quantitatively Assessing and Visualising Industrial System Attack Surfaces

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 2. METHODOLOGY 29<br />

Figure 2.3: Vulnerable node information within visualisation<br />

result for later use. We pickle these results so that we do not exceed Google’s daily request<br />

limit of 5000 queries, but also because there are often repetitions. For example we found<br />

over 200 results in The Hague, <strong>and</strong> there is no need to repeat these location queries.<br />

At the end of a run of our code the city cache is pickled (saved to disc), for future use<br />

when we run another week of queries. This cache data will not alter between runs <strong>and</strong><br />

each city geocoding query should only be run once. This is in contrast to our exploit<br />

queries, which are cached on a session-only basis.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!