Advances, Systems and Applications
From: A new method of dynamic network security analysis based on dynamic uncertain causality graph
Simulate Attack Sequence | Attack Alert Sequence | Candidate Sequence |
---|---|---|
B1, X9, X10, X11, X4, X5, X6, X7, X8, X26, X31, X32, X37, X34, X29, X40, X43, X44, X45, X46 | X11, X26, X40, X4(Missing: B2, X9, X11, X26, X32, X34, X29, X4, X6, X7, X8, X29, X40, X44, X45) | B2 → X9 → X10 → X11 → X4 (X26, X40) |
B2, X16, X17, X18, X26, X31, X32, X37, X34, X29, X36, X39, X42, X43, X44, X45, X46 | X17, X18, X31, X32, X37, X34, X29, X36, X39, X42, X43, X46 (Missing: X16, X44, X45) | B3 → X16 → X17 → X18 → X26 → X31 → X32 → X37 → X34 → X29 |