A survey on the usability and practical applications of Graphical Security Models

Jin B. Hong, Dong Seong Kim, Chun Jen Chung, Dijiang Huang

Research output: Contribution to journalReview articlepeer-review

56 Scopus citations


This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic.

Original languageEnglish (US)
Pages (from-to)1-16
Number of pages16
JournalComputer Science Review
StatePublished - Nov 2017


  • Attack graphs
  • Attack trees
  • Security analysis
  • Security metrics
  • Security models

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'A survey on the usability and practical applications of Graphical Security Models'. Together they form a unique fingerprint.

Cite this