“…Much work has already been done in analyzing network configuration data and identifying network vulnerabilities to construct attack graphs [2,6,7,8,14,15,16,19,20,21,29,30,31,32,35,37,40,41,42,44]. Attack graphs illustrate the cumulative effect of attack steps, showing how series of individual steps can potentially enable an attacker to gain privileges deep into the network.…”