Research Article

Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning

Algorithm 1

Attack-defense graph generation algorithm.
Input: Elements of Cyber security , Attack Template , Defense Template
Output: Attack graph
(1)/∗ Generate all nodes ∗/
(2)for each do:/∗ Attack instantiation to generate attack edges ∗/
(3) update in /∗ Updating Cyber security Elements ∗/
(4)if and and and :
(5)  
(6)  
(7)  
(8)  
(9) end if
(10)end for
(11)for each do:/∗ Defense instantiation to generate defense edges ∗/
(12) if and :
(13)  
(14) end if
(15)end for
(16)for each do:/∗ Remove isolated nodes S ∗/
(17) if and :
(18)  
(19) end if
(20)end for
(21)Return