An attack graph-based on-line multi-step attack detector
Modern distributed systems are characterized by complex deployment designed to ensure high availability through replication and diversity, to tolerate the presence of failures and to limit the possibility of successful compromising.
However, software is not free from bugs that generate vulnerabilities that could be exploited by an attacker through multiple steps.