Research Article
Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory
Table 4
Candidate attack-defense actions for vulnerabilities.
| ā | IIS | Apache | HIDP | GUN Wget | NDproxy |
| Attack action | a2, a7 | a1 | a4, a5, a8 | a2, a7, a8 | a3, a7 | Defense action | d3, d4 | D1, d8, d13 | d1, d6, d7, d10 | d3, d4, d12 | d3, d6 |
|
|