Skip to main content

Advances, Systems and Applications

Table 8 Assuming the scenario B1, the calculation process for the posterior probability of nodes in Path 1

From: A new method of dynamic network security analysis based on dynamic uncertain causality graph

Node

Causal Chain Expression

Posterior Probability

V1

-

1

S2

1/4*(A2;1,1 + A4,1;2 + A3,1;2 + 1/4*A5;2A8;5A13,1;5)

0.473

V5

1/2*(A2;1,1A5,2 + 1/4*A8;5A13,1;8)

0.197

V3

-

1

V4

-

1

S4

-

1

S5

1/3*(A5;4 + 1/2*A7;5A6;7A11,1;6 + 1/4*A8;5A7;8A12;7A8;12A13;8 + 1/4*A10;5A8;10A13,1;8)

0.4126

V6

-

1

V7

1/2*(A5;4A7;5 + 1/2*A11,1;6A6;7)

0.369

V8

1/2*(A5;4A8;5 + 1/4*A13,1;8A8;12A12;7A7;8)

0.2755

V10

1/2*(A5;4A10;5 + 1/4*A8;10A13,1;8)

0.2125

S6

1/3*(1/2*A5;4A7;5A6;7 + 1/2*A6,6 + A11,1;6)

0.5396

S7

1/2*(A5;4A8;5A7;8+ 1/4*A13,1;8A8;12A12;7)

0.2755

V11

-

1

V12

1/2*(A5;4A8;5A7;8A12;7 + 1/4*A13,1;8A8;12)

0.2755

S8

1/4*(A13,1;8 + 1/4*(A2;1,1A5,2A8;5 + A8;11 + A5;4A8;5A7;8A12;7A8;12 + A5;4A10;5A8;10)

3512

V13

-

1

S9

-

1