This project presents an algorithm to assess the impact of a breach in a Virtual Machine (VM) network, ranking infected VMs by severity based on their connection types (Peer-to-peer > TCP > UDP > ICMP). It aids security administrators in prioritizing their response to contain and mitigate the breach's effects.
-
Updated
Oct 8, 2023 - C++