Research Article
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis
Algorithm 3
Pseudocode for calculating ENV.
Input: Real - time alert flow | Output: Matrix N and threat ranking of middle alert nodes | (1) Use Algorithm 1 to fuse original alert flow to generate different class clusters. | (2) For to h | (3)where h is the number of clusters | (4)Use Algorithm 2 to construct n×n transition probability matrix P of . | (5)Generate matrix Q from P according to Definition 2. | (6)Calculate foundational matrix . | (7)For to | (8)Rank , ,L, in value decreasing. | (9)Return matrix N and the node ranking. | (10)End | (11) End |
|