Research Article

Quantitative Method for Network Security Situation Based on Attack Prediction

Table 6

All possible attack paths.

NumberAttack path

Path 1
Path 2
Path 3
Path 4
Path 5
Path 6
Path 7
Path 8
Path 9