Research Article
Study on Stochastic Differential Game Model in Network Attack and Defense
Table 4
Atomic attack information.
| ID/name | Network attack strategy | | |
| 1 Remote buffer overflow | | | 2 Buffer error | √ | | 3 Install Web Listener program | | √ | 4 Install delete Trojan | √ | | 5 Trying to steal account | | √ | 6 FTP server information disclosure | √ | | 7 Homepage attack | √ | | 8 Check Point ZoneAlarm | | | 9 LPC to LSASS process | | √ | 10 SQL injection vulnerability | √ | |
|
|