Comparative Analysis of Attack Graphs


  • Levon H. Aslanyan Institute for Informatics and Automation Problems of NAS RA
  • Daryoush Alipour Institute for Informatics and Automation Problems of NAS RA
  • Minoosh Heidari Institute for Informatics and Automation Problems of NAS RA


Network security, Network vulnerability, Attack graph


It is well-known that nowadays computers and networks that are unique in their computational and service provision power have also major weaknesses and vulnerabilities that can be exploited by outsiders in compromising the valuable data and knowledge. Network administrators and network security analysts must be aware of different properties of current software solutions and diversity of problems regarding the possible protection of network assets. This means that they must know and use the latest and newest types of vulnerabilities, techniques and tools. “Attack Graphs” present formalized network maps and help with analysis of possible vulnerabilities that may exist in the network. Hence, in this paper we will describe some basic concepts that can be used to understand and generate the attack graphs.


K. Ingols, R. Lippmann and K. Piwowarski, Practical Attack Graph Generation for Network Defense, MIT Lincoln Laboratory, 2006.

Common Vulnerabilities and Exposures (CVE®), The standard for Information security Vulnerability Names, [Online]. Available:

Open Sourced Vulnerability Database, [Online]. Available:

Common Vulnerability Scoring System (CVSS-SIG), [Online]. Available:

National Vulnerability Database Version 2.2, NIST, USA, [Online]. Available:

S. Jha, O. Sheyner and J.M. Wing, Minimization and Reliability Analyses of Attack Graphs. School of Computer Science Carnegie Mellon University, 2002.

S. Noel, L. Wang, A. Singhal and S. Jajodia, “Measuring security risk of networks using attack graphs”, International Journal of Next-Generation Computing, vol. 1, no. 1, pp. 135-147, July 2010.

S. Noel and S. Jajodia, “Managing attack graph complexity through visual hierarchical aggregation”, CCS Workshop on Visualization and Data Mining for Computer Security’04, October 29, Fairfax, Virginia, USA, 10p., 2004.

F. Chen, et al., “An atomic-domains-based approach for attack graph generation”, World Academy of Science, Engineering and Technology, vol. 56, pp. 775-781, 2009.

M. Jamali and V. Ashraf, “Attack graph analysis using parallel algorithm”, 5th symposium on Advances in Science & Technology, 7p., 2011.

N. C. Idika, Characterizing and Aggregating Attack Graph-based Security Metrics, Purdue University, West Lafayette, Indiana, 2010.




How to Cite

Aslanyan, L. H., Alipour, D., & Heidari, M. (2021). Comparative Analysis of Attack Graphs. Mathematical Problems of Computer Science, 40, 85–95. Retrieved from