Review Article

Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing

Table 4

Comparison of attack graph analysis methods.

Analysis methodAdvantageDisadvantageCalculation tasksComplexityScalability

Graph algorithmIntuitive, portableInsufficient combination with exploit utilizationIdentify the most likely path and high-risk node, predict attack behaviorO(n2)Strong

Bayesian networkFlexible, easy to trainComplicated analytical calculationsAnalyze vulnerability, identify high-risk nodes, network hardening, and predict attack behaviorO(n2)General

Markov modelEasy to train, better predictionMore restrictionsIdentify the most likely paths, identify high-risk nodes, network hardening, and predict attack behaviorO(n2)General

Cost optimization algorithm
 Game theoryStrong portabilitySlight discrepancy with actual resultsNetwork hardening, predict attack behaviorO(n2)General
 Cost minimization algorithmStrong portabilityLimited application, difficult model selectionNetwork hardening, predict attack behaviorO(n)Strong

Uncertainty algorithmSolved problems that other algorithms cannot solveLimited application areasAnalyze vulnerability, identify high-risk nodesStrong