Research Article

Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory

Table 2

Strength and payoff of defense action.

No.DescriptionStrengthPayoff

D1Limit packets form ports0.83
D2Install Oracle patch0.8
D3Reinstall Listener program0.8
D4Uninstall, delete Trojan0.7
D5Limit access to MDSYS.SDO_CS0.7

D6Renew root data0.62
D7Restart database server0.6
D8Limit SYN/ICMP packets0.5
D9Add physical resource0.5
d10Repair database0.4

d11Correct homepage0.41
d12Delete suspicious account0.3
d13Redeploy firewall rule and filtrate malicious packets0.3
d14Patch SSH on Ftp0.2