Research Article

Network Security Situation Assessment Model Based on Extended Hidden Markov

Table 7

Observation vector sequence.

Start timeEnd timeAttack nameNumber of attacksImportance of attack

2015/11/3, 0:002015/11/3, 0:05SMTP mail attachment vulnerability421117
2015/11/3, 0:052015/11/3, 0:10SQL injection attack (select)51155
2015/11/3, 0:102015/11/3, 0:15SMTP mail attachment vulnerability31191