Research Article

New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks

Table 5

Comparisons of security metrics among our method and others.

TypesRef. [10]Ref. [16]Ref. [17]Ref. [18]Ref. [19]Ours

Most likely attack path
Cumulative success probability of intention
Number of attack paths
Mean of path lengths
Median of path lengths
Mode of path lengths
EAIP of intention
EAPL of breaching intention