Research Article

An Approach for Internal Network Security Metric Based on Attack Probability

Table 4

The key-value pairs with attack probability.

Key-value pairAttack probability ((, ))

(Root 0, , User 1)
(Root 0, , User 2)
(User 1, , User 3)
(User 1, , User 4)
(User 2, , User 3)
(User 2, , User 4)
(User 4, , User 3)
(User 3, , User 5)
(User 4, , User 5)
(User 5, , Root 5)