Research Article
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks
Table 5
Comparisons of security metrics among our method and others.
| Types | Ref. [10] | Ref. [16] | Ref. [17] | Ref. [18] | Ref. [19] | Ours |
| Most likely attack path | | | ✓ | ✓ | ✓ | ✓ | Cumulative success probability of intention | ✓ | ✓ | | ✓ | ✓ | ✓ | Number of attack paths | | ✓ | ✓ | ✓ | ✓ | ✓ | Mean of path lengths | | | | ✓ | ✓ | ✓ | Median of path lengths | | | | ✓ | ✓ | ✓ | Mode of path lengths | | | | ✓ | ✓ | ✓ | EAIP of intention | | | | | | ✓ | EAPL of breaching intention | | | | | | ✓ |
|
|