
21.6. PRIVATE GRAPH DRAWING 673
(a)
(b)
Figure 21.19 Visualization of (a) an attack graph with importance levels of the hosts, (b)
multiple attacks between subnets, displayed as a hybrid edge of multiple colors (thumbnails
of images from [CIL
+
10]).
Given that there are multiple attacks and that the type and the depth of these attacks
can vary, the authors propose a way to aggregate this information into hybrid edges to
avoid clutter (see Figure 21.19(b)). For example, the solid part of an edge shows server-side
attacks, while client-side attacks are displayed as dashed segments.
The authors of [CIL
+
10] have modified the strip treemap algorithm to achiev ...