Research Article

Active Defense Strategy Selection Method Based on Two-Way Signaling Game

Table 4

Attack-defense strategy and operating cost.

Atomic attack actionAtomic defense action
a1a2a3a4d1d2d3d4

Install listener programUninstall listener program
Remote buffer overflowBuffer overflow protection
Install delete TrojanUninstall delete Trojan
Attack SSH on FTPServerRestart FTPserver
Steal account and passwordChange account and password
Raise authorityDelete suspicious account
Remote code injectionIdentify code injection
Violent crack passwordIncrease password complexity

AC480460240220DC680640440410
DAC80703020DDC100804030