Research Article
Quantitative Method for Network Security Situation Based on Attack Prediction
Table 4
Description of attack states information.
| No. | | | | | | | |
| Name | Initial state | root | root | user | root | user | root | Description | Remote attacker | (M1, root) | (M2, root) | (M3, user) | (M3, root) | (M4, user) | (M5, root) |
|
|