Research Article
Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory
Table 2
Strength and payoff of defense action.
| No. | Description | Strength | Payoff |
| D1 | Limit packets form ports | 0.8 | 3 | D2 | Install Oracle patch | 0.8 | D3 | Reinstall Listener program | 0.8 | D4 | Uninstall, delete Trojan | 0.7 | D5 | Limit access to MDSYS.SDO_CS | 0.7 |
| D6 | Renew root data | 0.6 | 2 | D7 | Restart database server | 0.6 | D8 | Limit SYN/ICMP packets | 0.5 | D9 | Add physical resource | 0.5 | d10 | Repair database | 0.4 |
| d11 | Correct homepage | 0.4 | 1 | d12 | Delete suspicious account | 0.3 | d13 | Redeploy firewall rule and filtrate malicious packets | 0.3 | d14 | Patch SSH on Ftp | 0.2 |
|
|