Research Article
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning
Table 1
Network vulnerability information.
| Attack identifier | Host | CVE | Target privilege |
| tid1 | Web server | CVE-2015-1635 | user | tid2 | Web server | CVE-2017-7269 | root | tid3 | Web server | CVE-2014-8517 | root | tid4 | FTP server | CVE-2014-3556 | root | tid5 | E-mail server | CVE-2014-4877 | root | tid6 | Database server | CVE-2013-4730 | user | tid7 | Database server | CVE-2016-6662 | root |
|
|