Skip to main content

Advances, Systems and Applications

Table 4 Variables in DUCAG

From: A new method of dynamic network security analysis based on dynamic uncertain causality graph

Variable

Description

B2

IP sweep operation

X2, X10, X17, X24, X42, X12, X13, X28, X35, X33

Sadmind Ping operation

X30, X15, X14, X27, X41, X36

Sadmind Ping Exploit operation

X6, X32, X44

Daemon Installed operation

X8, X34, X46

DDoS attack

B1, B3, B4

DNS Query operation

X1, X3, X4, X26, X40, X5, X7, X9, X11, X19, X20, X21, X22, X3,X29, X35, X37, X28, X39, X43, X46, X16, X18, X25

Sources

G1

X3 \(\cup\)X11

G2

X11 \(\cup\)X18

G3

X11 \(\cup\)X25