Research Article

Efficient Defense Decision-Making Approach for Multistep Attacks Based on the Attack Graph and Game Theory

Table 4

Candidate attack-defense actions for vulnerabilities.

ā€‰IISApacheHIDPGUN WgetNDproxy

Attack actiona2, a7a1a4, a5, a8a2, a7, a8a3, a7
Defense actiond3, d4D1, d8, d13d1, d6, d7, d10d3, d4, d12d3, d6