Skip to main content

Advances, Systems and Applications

Table 5 Configuration of experiment 1

From: A new method of dynamic network security analysis based on dynamic uncertain causality graph

Simulate Attack Sequence

Attack Alert Sequence

Candidate Sequence

B1X9, X10, X11, X4, X5, X6, X7, X8, X26, X31, X32, X37, X34, X29, X40, X43, X44, X45, X46

X11, X26, X40, X4(Missing: B2, X9, X11, X26, X32, X34, X29, X4, X6, X7, X8, X29, X40, X44, X45)

B→ X9 → X10 → X11 → X4 (X26, X40)

B2X16, X17, X18, X26, X31, X32, X37, X34, X29, X36, X39, X42, X43, X44, X45, X46

X17, X18, X31, X32, X37, X34, X29, X36, X39, X42, X43, X46 (Missing: X16, X44, X45)

B→ X16 → X17 → X18 → X26 → X31 → X32 → X37 → X34 → X29