Research Article
Network Security Situation Assessment Model Based on Extended Hidden Markov
Table 2
Network equipment defense efficiency judgment matrix.
| Item | Number of connections | Bandwidth utilization | Memory utilization | CPU utilization |
| Number of connections | 1 | 1/3 | 1/2 | 1/2 | Bandwidth utilization | 3 | 1 | 2 | 2 | Memory utilization | 2 | 1/2 | 1 | 2 | CPU utilization | 2 | 1/2 | 1/2 | 1 |
|
|