A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things
Table 1
Some attack types of CAPEC.
Attack
Likelihood of attack
Typical severity
Resources required
CAPEC-94: man-in-the-middle attack
High
Very high
Two components are communicating with each other. The communication occurs in clear (not encrypted) or with insufficient and deceivable encryption.
CAPEC-125: flooding
High
Medium
A script or program capable of generating more requests than the target can handle, or a network or cluster of objects can make simultaneous requests.
CAPEC-163: spear phishing
High
High
An adversary must have the ability to communicate their phishing scheme to the victims (via email and instant message), as well as a website or other platforms for victims to enter personal information into.