Research Article

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Table 3

The descriptions of alerts and their attack types in cluster A1.

Alert NumberAttack Type

a1ICMP PING

a2TELENT Bad login

a3RPC sadmind UDP PING

a4WEB-MISC adobe portable document format file download attempt

a5RSERVICES rsh root

a6DOS mstream handler to client

a7BAD-TRAFFIC loopback traffic