Research Article
Network Security Situation Assessment Model Based on Extended Hidden Markov
Table 7
Observation vector sequence.
| Start time | End time | Attack name | Number of attacks | Importance of attack |
| 2015/11/3, 0:00 | 2015/11/3, 0:05 | SMTP mail attachment vulnerability | 42 | 1117 | 2015/11/3, 0:05 | 2015/11/3, 0:10 | SQL injection attack (select) | 51 | 155 | 2015/11/3, 0:10 | 2015/11/3, 0:15 | SMTP mail attachment vulnerability | 31 | 191 |
|
|