Attainable defenses to interrupt this attack, that may be carried out to boost the protection standard of the technique, are indicated by inexperienced circles. Furthermore, the width in the traces involving the attack methods and defenses implies the probability from the attack route. Below, the traces are of equal width https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network