International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
A graph based on an attack can be used by a network administrator to measure an enterprise networks accurately. A network administrator can understand the most critical threats and choose the best countermeasures. Attack graph is an integral part of modeling the overview of network security. Network administrators use attack graphs to know how vulnerable their systems and to choose what security measures to maintain the system to deploy them. An attack graph is an abstraction that represents how an attacker may violate security policy by exploiting the interdependence between the discovered vulnerabilities.