Possible defenses to interrupt this attack, which can be carried out to increase the stability volume of the technique, are indicated by eco-friendly circles. On top of that, the width of your strains in between the attack ways and defenses implies the chance in the attack route. Here, the traces https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network