Advances, Systems and Applications
From: A new method of dynamic network security analysis based on dynamic uncertain causality graph
Variable | Description |
---|---|
B2 | IP sweep operation |
X2, X10, X17, X24, X42, X12, X13, X28, X35, X33 | Sadmind Ping operation |
X30, X15, X14, X27, X41, X36 | Sadmind Ping Exploit operation |
X6, X32, X44 | Daemon Installed operation |
X8, X34, X46 | DDoS attack |
B1, B3, B4 | DNS Query operation |
X1, X3, X4, X26, X40, X5, X7, X9, X11, X19, X20, X21, X22, X3,X29, X35, X37, X28, X39, X43, X46, X16, X18, X25 | Sources |
G1 | X3 \(\cup\)X11 |
G2 | X11 \(\cup\)X18 |
G3 | X11 \(\cup\)X25 |