Research Article

Active Defense Strategy Selection Method Based on Two-Way Signaling Game

Table 3

Security vulnerability of the experimental network.

No.Object of actionCVE codeThreat typeThreat level

1WebserverCVE-2015-1635Code injectionExtreme risk
2WebserverCVE-2017-7269Buffer zone overflowExtreme risk
3FTPserverCVE-2014-8517Operating system command injectionHigh risk
4BastionserverCVE-2014-3556Operating system command injectionHigh risk
5FileserverCVE-2013-4730Buffer zone overflowExtreme risk
6DatabaseserverCVE-2016-6662Authorization and access controlExtreme risk