Research Article
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning
Algorithm 1
Attack-defense graph generation algorithm.
| Input: Elements of Cyber security , Attack Template , Defense Template | | Output: Attack graph | (1) | /∗ Generate all nodes ∗/ | (2) | for each do:/∗ Attack instantiation to generate attack edges ∗/ | (3) | update in /∗ Updating Cyber security Elements ∗/ | (4) | if and and and : | (5) | | (6) | | (7) | | (8) | | (9) | end if | (10) | end for | (11) | for each do:/∗ Defense instantiation to generate defense edges ∗/ | (12) | if and : | (13) | | (14) | end if | (15) | end for | (16) | for each do:/∗ Remove isolated nodes S ∗/ | (17) | if and : | (18) | | (19) | end if | (20) | end for | (21) | Return |
|