Research Article

Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory

Table 3

Node information.

Host/serverProtocol/vulnerabilityPort

WebIIS445
DataApache80
H1HIDP445
H2GUN Wget80
H3NDproxy445