The Construction and Application of Network Attack Graph