Research Article

Network Security Situation Assessment Model Based on Extended Hidden Markov

Table 6

Network security equipment log.

TimeAttack nameSource IPSource portDestination IPDestination portAttack level

2015/11/3 0:00SMTP mail attachment vulnerability27.24.159.23124476168.160.167.2825Prompt
2015/11/3 0:00SMTP mail attachment vulnerability116.207.12.1752724168.160.167.2825Prompt
2015/11/3 0:00SMTP mail attachment vulnerability221.239.226.2142858168.160.200.1825Prompt
2015/11/3 0:00SMTP mail attachment vulnerability221.239.226.2142858168.160.200.1825Prompt
2015/11/3 0:01SMTP mail attachment vulnerability119.147.194.22647271168.160.1.10425Prompt
2015/11/3 0:01SMTP mail attachment vulnerability119.147.194.22647271168.160.1.10425Prompt
2015/11/3 0:01SMTP mail attachment vulnerability111.176.71.2223843168.160.200.1825Prompt
2015/11/3 0:01SMTP mail attachment vulnerability27.24.159.22811682168.160.1.10425Prompt
2015/11/3 0:01SMTP mail attachment vulnerability27.24.159.22811682168.160.1.10425Prompt
2015/11/3 0:01SMTP mail attachment vulnerability49.70.232.1394687168.160.1.10925Prompt
2015/11/3 0:01SMTP mail attachment vulnerability116.207.13.721785168.160.200.1825Prompt
2015/11/3 0:01SMTP mail attachment vulnerability116.207.13.721785168.160.200.1825Prompt
2015/11/3 0:02SMTP mail attachment vulnerability27.24.159.2312981168.160.167.2825Prompt
2015/11/3 0:02SMTP mail attachment vulnerability111.176.77.1993101168.160.200.1825Prompt
2015/11/3 0:02SMTP mail attachment vulnerability111.176.77.1993101168.160.200.1825Prompt
2015/11/3 0:02SMTP mail attachment vulnerability111.176.71.2224214168.160.1.10425Prompt
2015/11/3 0:02SMTP mail attachment vulnerability111.176.71.2224214168.160.1.10425Prompt
2015/11/3 0:02SMTP mail attachment vulnerability58.217.74.332270168.160.1.10425Prompt
2015/11/3 0:02SMTP mail attachment vulnerability58.217.74.332270168.160.1.10425Prompt
2015/11/3 0:03SMTP mail attachment vulnerability222.72.175.1854819168.160.200.1825Prompt