Research Article
Network Security Situation Assessment Model Based on Extended Hidden Markov
Table 2
Network equipment defense efficiency judgment matrix.
| | Item | Number of connections | Bandwidth utilization | Memory utilization | CPU utilization |
| | Number of connections | 1 | 1/3 | 1/2 | 1/2 | | Bandwidth utilization | 3 | 1 | 2 | 2 | | Memory utilization | 2 | 1/2 | 1 | 2 | | CPU utilization | 2 | 1/2 | 1/2 | 1 |
|
|