Research Article

A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice

Table 2

Attack strategy description.

No.Basic attack optionAttack strategy

Remote buffer overflow
homepage attack
LPC to LSASS process
Apache chunk overflow
Steal account and crack it
Oracle TNS listener