Research Article

Study on Stochastic Differential Game Model in Network Attack and Defense

Table 4

Atomic attack information.

ID/nameNetwork attack strategy

1 Remote buffer overflow
2 Buffer error
3 Install Web Listener program
4 Install delete Trojan
5 Trying to steal account
6 FTP server information disclosure
7 Homepage attack
8 Check Point ZoneAlarm
9 LPC to LSASS process
10 SQL injection vulnerability