Research Article

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Table 1

Firewall policy.

SourceDestinationProtocolPort

InternetWebserverHTTP80
InternetDatabase ServerHTTP80
WebserverDatabase ServerPostgreSQL3306
WebserverFTP ServerNFS21
WebserverGraphic WorkstationSIP5060
WebserverAuthentication ServerKerberos UDP88
Database ServerFTP ServerNFS21
Database ServerGraphic WorkstationSIP5060
Database ServerAuthentication ServerSSL443
Database ServerWebserverTCP3306
Authentication ServerFTP ServerNFS21
Authentication ServerGraphic WorkstationSIP5060