Advances, Systems and Applications
From: A new method of dynamic network security analysis based on dynamic uncertain causality graph
Attack Path | Transition Probability | Attack Path | Transition Probability |
---|---|---|---|
BX1 → V1 | 1 | BX1 → V2 | 1 |
G1 → BX1 | 0.5 | B2 → V2 | 0.155 |
B1 → V1 | 0.845 | S2 → V3 | 0.284 |
V2 → S3 | 1 | S2 → V5 | 0.144 |
V3 → S4 | 1 | S3 → V9 | 1 |
V4 → S5 | 1 | S4 → V6 | 1 |
V5 → S8 | 1 | S5 → V7 | 0.238 |
V6 → S6 | 1 | S5 → V8 | 0.301 |
V7 → S6 | 1 | S5 → V9 | 0.286 |
V8 → S7 | 1 | S5 → V10 | 0.175 |
V9 → S9 | 1 | S6 → V11 | 1 |
V10 → S8 | 1 | S7 → V12 | 1 |
V13 → S9 | 1 | S8 → V13 | 1 |