Skip to main content

Table 3 The percentage of times \(q^{n}_{i}(\Omega)>T\) and \(q^{n}_{i}(G)>T\) for the target port and alert signature features

From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

 

Target port

Signature

T

\(q^{n}_{i}(\Omega)\)

\(q^{n}_{i}(G)\)

\(q^{n}_{i}(\Omega)\)

\(q^{n}_{i}(G)\)

0.05

26.51

25.17

22.05

18.88

0.10

12.97

9.8

6.08

3.22

0.15

4.88

3.44

3.61

2.77

0.20

3.46

1.49

2.59

1.23

0.25

1.29

0

0.86

0

0.30

0.7

0

0.41

0

0.35

0.53

0

0.3

0

0.40

0.38

0

0.14

0

0.45

0.34

0

0.12

0

0.50

0.13

0

0.05

0