Research Article

An Approach for Internal Network Security Metric Based on Attack Probability

Pseudocode 1

The pseudocode of confidence analysis.
Procedure IsAvailableMonitor
Input: AO, EO
//AO - Sequence of attack evidence of a monitoring event node in the alarm log;
//EO - Attack evidence sequence of the corresponding atomic attack action
Output: The confidence value of the monitoring event node
Method:
(01) String function(AO)
(02) initialize EO
(03) A= getS(AO)
(04) t=0
(05) S=
(06) for i=1:EO.size()
(07) count=0;
(08) for j=1:A.size()
(09) n=j, m=i
(10) while (A(n)==EO(m)  &&  m<=A.size()&&n<=EO.size())
(11) count++, m++, n++;
(12) t++;
(13) S=count
(14) f=max(S)
(15) if (f>= EO.size()) return True;
(16) else return False;