Research Article

Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement

Table 2

Malicious behavior set.

Behavior content

SQL injection
Port scan
IP deception
Distributed deny attack
SYN flooding attack
Replay attack
Network surveillance attack
Virus attack