Research Article
Network Attack and Defense Modeling and System Security Analysis: A Novel Approach Using Stochastic Evolutionary Game Petri Net
Table 1
Attack and defense behavior set.
| Players | Action | Symbol | Description |
| Attacker | Scan_Vulnerability | | Vulnerability scan of network system | Crack_Password | | Obtain user login information | Enhance_permission | | Enhance the operating permission | Install_sniffer | | Install sniffer software to invade the host | Steal_information | | Steal system confidential data resources |
| ā | | | Do nothing |
| Defender | IDS_scan | | Delete the threatening account and restart | Cheat_attacker | | Restore the network and delete the threatening account | Blockade_IP | | Install sniffer monitoring program | Remove_sniffer | | Clear sniffer monitoring program | | | Do nothing |
|
|