Research Article
Network Attack and Defense Modeling and System Security Analysis: A Novel Approach Using Stochastic Evolutionary Game Petri Net
Table 2
The meaning of place and transition.
| Place | Meaning | Transition | Meaning |
| | The normal state of the system | | Vulnerability scan of network system | | The vulnerability of the web server was discovered | | Obtain user login information | | Get normal operation permission | | Enhance the operating permission | | Get root operation authority | | Install sniffer software to invade the host | | Implant sniffer | | Steal system confidential data resources | | System confidential data resources was stolen | | IDS_scan | | Admin_know | | Blockade_IP | | Attack_terminated | | Remove_sniffer | | Sniffer_removed | | Return |
|
|