Research Article
Network Attack and Defense Modeling and System Security Analysis: A Novel Approach Using Stochastic Evolutionary Game Petri Net
Table 1
Attack and defense behavior set.
| | Players | Action | Symbol | Description |
| | Attacker | Scan_Vulnerability | | Vulnerability scan of network system | | Crack_Password | | Obtain user login information | | Enhance_permission | | Enhance the operating permission | | Install_sniffer | | Install sniffer software to invade the host | | Steal_information | | Steal system confidential data resources |
| | ā | | | Do nothing |
| | Defender | IDS_scan | | Delete the threatening account and restart | | Cheat_attacker | | Restore the network and delete the threatening account | | Blockade_IP | | Install sniffer monitoring program | | Remove_sniffer | | Clear sniffer monitoring program | | | Do nothing |
|
|