ICS Topology Attack Path Visualiser


- Rewrite of the GENIND Topology generator in my CS Final Year Project as a demo page using Sigma.js.

- Hovering over nodes will reveal the attack paths that exist on the selected node between the entry and target nodes.

- Conceptually, all nodes may be visited by an attacker when conducting an attack, therefore CAGs are used to compact the whole set of paths to a smaller set that may be used by the attacker.

(Note; the contents of this demo page have been written after submitting my project and is not part of my original dissertation.)