Research Article
Discover the Hidden Attack Path in Multiple Domain Cyberspace Based on Reinforcement Learning
Table 1
Network services in the experiment environment.
| Web service | Web service’s role | Service support equipment | Service dependent port | Service password |
| T2_manager | Remote management equipment | T2 | T2_E0 | None | FW1_manager | Remote management equipment | FW1 | FW1_E2 | FW1_password | FW2_manager | Remote management equipment | FW2 | FW2_E2 | FW2_password | S1_web | Web services in server S1 | S1 | S1_E0 | S1_web_password | S2_web | Web services in server S2 | S2 | S2_E0 | S2_web_password |
|
|