Research Article
Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory
Table 1
Strength and payoff of attack action.
| No. | Description | Strength | Payoff |
| a1 | Remote buffer overflow | 0.95 | 3 | a2 | Install Trojan | 0.8 | a3 | Steal account and crack it | 0.7 |
| a4 | Send abnormal data to GIOP | 0.5 | 2 | a5 | Shut down database server | 0.45 | a6 | LPC to LSASS | 0.4 |
| a7 | Oracle TNS Listener | 0.35 | 1 | a8 | Ftp RHOST attack | 0.3 | a9 | Sr-Hard blood | 0.25 |
|
|