Research Article

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Table 2

Host configuration and vulnerability information.

Host #Configuration of
Host #
ServiceCVE #No.Overview of CVE #

H1Web server
Windows server 2012
HTTPCVE
2012-3328
v1Allowing remote attackers to inject arbitrary web script or HTML via vectors related to a hidden frame footer

H2Database server
MSQL server 2000
PostgreSQLCVE
2013-0676
v2Allowing remote authenticated users to obtain sensitive information via a SQL query

H3Authentication server
Windows server 2012
KerberosCVE
2016-0049
v3Allowing remote attackers to bypass authentication by deploying a crafted Key Distribution Center (KDC) and then performing a sign-in action
SSLCVE
2012-6137
v5Allowing remote man-in-the-middle attackers to obtain sensitive information such as user credentials

H4Graphic workstation
Red hat Linux 7.2
LinuxCVE 2013-4512v6Allowing local users to cause a denial of service or possibly have other unspecified impact by leveraging root privileges for a write operation

H5FTP server
Windows server 2012
HFSCVE
2014-6287
v4Allowing remote attackers to execute arbitrary programs via a sequence in a search action