Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

Table 4

Description of attack states information.

No.

NameInitial stateroot rootuserrootuserroot
DescriptionRemote attacker(M1, root)(M2, root)(M3, user)(M3, root)(M4, user)(M5, root)