Research Article
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice
Table 2
Attack strategy description.
| No. | Basic attack option | Attack strategy | | |
| | Remote buffer overflow | √ | √ | | homepage attack | √ | | | LPC to LSASS process | √ | √ | | Apache chunk overflow | | √ | | Steal account and crack it | √ | | | Oracle TNS listener | | √ |
|
|