I. Introduction
When defending an isolated network with critical resources, some vulnerabilities may seem to be insignificant. Attackers, however, can often infiltrate a seemingly well-guarded network using multi-step attacks by exploiting sequences of related vulnerabilities. Attack graphs can reveal such potential threats by enumerating all possible sequences attackers can exploit. The earlier methods [1]–2, 6–[13] can only generate state-based attack graphs for the small target network of size ten. Hence, the scalability of attack graphs generation is a serious issue. Recently, researchers propose some novel approaches to construct compact attack graphs utilizing monotonicity assumption: an attacker never relinquishes any obtained capabilities [14]–[17]. The Ou's method even can generate compact attack graphs for the enterprise network with the size of thousands [15]. Consequently, security analysts face the challenge to analyze the sophisticated attack graphs with possible ten thousands of nodes. In the paper, we will discuss two essential issues.