ABSTRACT

This chapter discusses the systematic approach to gather an extensive database of literatures focusing on the generation and analysis of attack graphs. As the technology is shifting toward IoT, cloud computing, high data management, etc. cyber security is becoming the major challenge. Attacker may influence the target either through direct vulnerability exploitation on target or may follow indirect path approaching to target. Network can be easily secured against direct reachability as compared to indirect reachability because target machine vulnerabilities information can be easily gathered with the help of vulnerability scanners, but later one requires vulnerability information of multiple systems of network and their dependency upon. Attack graphs attract the researcher’s attention these days as it is the most reliable method to identify network security breaches. Attack graph portrays the information about a set of machines and their vulnerabilities that can be deleterious for network security.