Research Article

Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory

Table 1

Strength and payoff of attack action.

No.DescriptionStrengthPayoff

a1Remote buffer overflow0.953
a2Install Trojan0.8
a3Steal account and crack it0.7

a4Send abnormal data to GIOP0.52
a5Shut down database server0.45
a6LPC to LSASS0.4

a7Oracle TNS Listener0.351
a8Ftp RHOST attack0.3
a9Sr-Hard blood0.25