Research Article
Active Defense Strategy Selection Method Based on Two-Way Signaling Game
Table 3
Security vulnerability of the experimental network.
| No. | Object of action | CVE code | Threat type | Threat level |
| 1 | Webserver | CVE-2015-1635 | Code injection | Extreme risk | 2 | Webserver | CVE-2017-7269 | Buffer zone overflow | Extreme risk | 3 | FTPserver | CVE-2014-8517 | Operating system command injection | High risk | 4 | Bastionserver | CVE-2014-3556 | Operating system command injection | High risk | 5 | Fileserver | CVE-2013-4730 | Buffer zone overflow | Extreme risk | 6 | Databaseserver | CVE-2016-6662 | Authorization and access control | Extreme risk |
|
|