Research Article

Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game

Table 3

Atomic attack strategy description.

NumberAttack action nameAttack strategy

Weak password
Node attack
Trojan horse
Network monitoring
User name enumeration
Network sniffing