Research Article
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM
Table 2
Expected results of reconstruction.
| Host | Application | Communication component | Vulnerability |
| H A | App a | CC 1 | Vul Vul Vul | App b | CC 2 |
| H B | App c | CC 3 | Vul Vul | App d | CC 4 | CC 5 |
| H C | App e | CC 6 | Vul Vul | CC 7 | App f | CC 8 | Vul Vul Vul |
|
|