Research Article

Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning

Table 1

Network vulnerability information.

Attack identifierHostCVETarget privilege

tid1Web serverCVE-2015-1635user
tid2Web serverCVE-2017-7269root
tid3Web serverCVE-2014-8517root
tid4FTP serverCVE-2014-3556root
tid5E-mail serverCVE-2014-4877root
tid6Database serverCVE-2013-4730user
tid7Database serverCVE-2016-6662root