Research Article
Quantitative Method for Network Security Situation Based on Attack Prediction
Table 5
Description of attack behaviors information.
| State transition | CVE # | Probability | Expected time-cost |
| | CVE 2014-0098 | 0.7230 | 0.2746 | | CVE 2014-0063 | 0.5163 | 0.3845 | | CVE 2013-1324 | 0.7222 | 0.2749 | | CVE 2013-4782 | 0.7215 | 0.2751 | | CVE 2013-1324 | 0.7222 | 0.2749 | | CVE 2014-0038 | 0.3097 | 0.6409 | | CVE 2013-4782 | 0.7215 | 0.2751 | | CVE 2014-0063 | 0.5163 | 0.3845 | | CVE 2014-0038 | 0.3097 | 0.6409 | | CVE 2013-4782 | 0.7215 | 0.2751 | | CVE 2014-1878 | 0.7229 | 0.2746 | | CVE 2014-0063 | 0.5163 | 0.3845 | | CVE 2013-4782 | 0.7215 | 0.2751 | | CVE 2014-1878 | 0.7229 | 0.2746 |
|
|