“…Assumption of cost of launching attacks to be equal is one of drawbacks of the system as it varies to a great extend in practical scenarios (L. Wang, Singhal, & Jajodia, 2007b). As network infrastructure becomes large, attack graphs become larger and complex (Ou, Boyer, & McQueen, 2006) . In order to handle and generate larger attack graphs, scalable analysis is required incorporating probabilistic knowledge of behavior of attacker (L. Wang, Singhal, & Jajodia, 2007a;Xie, Wen, Zhang, Hu, & Chen, 2009).…”