Research Article
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis
Table 3
The descriptions of alerts and their attack types in cluster A1.
| Alert Number | Attack Type |
| a1 | ICMP PING |
| a2 | TELENT Bad login |
| a3 | RPC sadmind UDP PING |
| a4 | WEB-MISC adobe portable document format file download attempt |
| a5 | RSERVICES rsh root |
| a6 | DOS mstream handler to client |
| a7 | BAD-TRAFFIC loopback traffic |
|
|