Achievable defenses to interrupt this attack, which may be carried out to increase the security degree of the system, are indicated by inexperienced circles. Also, the width from the lines concerning the attack methods and defenses suggests the chance of your attack route. In this article, the traces are of https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network