Research Article
Active Defense Strategy Selection Method Based on Two-Way Signaling Game
Table 4
Attack-defense strategy and operating cost.
| Atomic attack action | | | Atomic defense action | | | a1 | a2 | a3 | a4 | d1 | d2 | d3 | d4 |
| Install listener program | √ | √ | √ | √ | Uninstall listener program | √ | √ | √ | | Remote buffer overflow | √ | √ | √ | | Buffer overflow protection | √ | √ | | | Install delete Trojan | √ | | | | Uninstall delete Trojan | √ | √ | | | Attack SSH on FTPServer | √ | √ | | | Restart FTPserver | √ | | √ | √ | Steal account and password | √ | | √ | √ | Change account and password | | √ | √ | √ | Raise authority | √ | √ | | | Delete suspicious account | √ | √ | √ | | Remote code injection | √ | √ | | | Identify code injection | √ | | | | Violent crack password | | | √ | √ | Increase password complexity | √ | √ | √ | √ |
| AC | 480 | 460 | 240 | 220 | DC | 680 | 640 | 440 | 410 | DAC | 80 | 70 | 30 | 20 | DDC | 100 | 80 | 40 | 30 |
|
|