Skip to main content

Advertisement

Table 3 The percentage of times \(q^{n}_{i}(\Omega)>T\) and \(q^{n}_{i}(G)>T\) for the target port and alert signature features

From: ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense

  Target port Signature
T \(q^{n}_{i}(\Omega)\) \(q^{n}_{i}(G)\) \(q^{n}_{i}(\Omega)\) \(q^{n}_{i}(G)\)
0.05 26.51 25.17 22.05 18.88
0.10 12.97 9.8 6.08 3.22
0.15 4.88 3.44 3.61 2.77
0.20 3.46 1.49 2.59 1.23
0.25 1.29 0 0.86 0
0.30 0.7 0 0.41 0
0.35 0.53 0 0.3 0
0.40 0.38 0 0.14 0
0.45 0.34 0 0.12 0
0.50 0.13 0 0.05 0