Intruders often combine exploits against multiple vulnerabilities in order to
break into the system. Each attack scenario is a sequence of exploits launched by an
intruder that leads to an undesirable state such as access to a database, service disruption,
etc. The collection of possible attack scenarios in a computer network can be represented by
a directed graph, called network attack gra...