Research Article
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis
Table 4
Comparisons of security metrics among our method and others.
| Types | Metrics | [9] | [10] | [11] | [14] | [17] | [18] | [20] | Ours |
| VAG-based security metrics | Shortest attack path length | ✓ | | ✓ | ✓ | | – | ✓ | | Most possible attack path | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | | Cumulative probability of attack target | ✓ | ✓ | | ✓ | | ✓ | ✓ | | Number of attack paths | ✓ | ✓ | ✓ | | | | ✓ | |
| AMC-based security metrics | ENV to the middle attack node | | | | | ✓ | | | ✓ | ESP of attack target node | | | | | | | | ✓ | Ranking of middle attack nodes | | | | | | | | ✓ | Ranking of attack targets | | | | | ✓ | | | ✓ |
|
|