I. Introduction
In defending a network with critical resources, certain vulnerabilities may seem to be insignificant when considered in isolation. An attacker can often infiltrate a seemingly well-guarded network using multi-step attacks by exploiting sequences of related vulnerabilities. Attack graphs can reveal such potential threats by enumerating all possible sequences of exploits that an attacker can follow to compromise given critical resources. Since the earlier methods can only generating state-based attack graphs for the small target network with the size of ten hosts in [1]–[2], [6][13], the scalability of generation attack graphs is a serious issue until the researchers recently proposed novel approaches to construction compact attack graphs based on monotonicity assumption, i.e., an attacker never relinquishes any obtained capabilities [14]–[17]. The Ou's method even can generate compact attack graphs for the enterprise network with the size of thousands of host in [15].