Research Article

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Figure 5

The AMC model extracted from the real alert flow.