ABSTRACT

Graph databases provide persistent storage of graphs. Most of the graph databases use native graph storage and native graph processing engines that leverage index-free adjacency. A graph database management system is a kind of not only structured query language database that allows persistent storage of entities and relationships between these entities. R. W. Ritchey and P. Ammann proposed the use of model-checking techniques for attack graph generation. One benefit of using model-checking techniques over custom algorithms for attack graph generation is that users need not worry about the problem of handling large state space, which is otherwise elegantly handled by standard model-checking software. The Network Security Planning Architecture attack graph generation system is based on a new representation of attack graph, that is, the multiple prerequisite graph. Topological vulnerability analysis (TVA) attack graph generation engine uses the algorithm proposed in P. Ammann et al. for attack graph generation. TVA adopts a topological approach to network vulnerability analysis.