Skip to main content

Advances, Systems and Applications

Table 3 The process of calculating the posterior probability of attack graph nodes

From: A new method of dynamic network security analysis based on dynamic uncertain causality graph

Node

Causal Chain Expression

Posterior Probability

B1

-

1

V1

1/2(A1;1 + A2;1*A4,1;2)

1/2(0.845*1+0.572) =0.7085

S2

1/2(A1;1A2;1 + A4,1;2)

1/2(0.845*1+0.572) =0.7085

V3

A1;1*A2;1*A3;2

0.845*1*0.284=0.23998

V4,1

-

1

S5

A5;4,1

1*1=1

S6

1/2* A1;1 * A2;1 * A3;2 * A6;3+ 

1/2* A5;4,1 * A7;5 * A6;7

1/2*(0.845*1*0.284*1+0.238)

 =0.23899

V7

A5;4,1*A7;5

1*0.238=0.238