Advances, Systems and Applications
From: A new method of dynamic network security analysis based on dynamic uncertain causality graph
Candidate Paths | Posterior Probability of Attack Paths | Probability Normalization |
---|---|---|
B1(BX1) → V1 → S2 → V5 → S8 → V13 → S9 | 0.0654 | 0.1293 |
B1(BX1) → V1 → S2 → V3 → S4 → V6 → S6 → V11 → S8 → V13 → S9 | 0.1792 | 0.3542 |
B1(BX1) → V1 → S2 → V4 → S5 → V7 → S6 → V11 → S8 → V13 → S9 | 0.0249 | 0.0492 |
B1(BX1) → V1 → S2 → V4 → S5 → V8 → S7 → V12 → S8 → V13 → S9 | 0.0025 | 0.0049 |
B1(BX1) → V1 → S2 → V3 → S5 → V10 → S8 → V13 → S9 | 0.0261 | 0.0516 |
BX1 → V1 → S2 → V4 → S5 → V9 → S9 | 0.0589 | 0.1164 |
BX1 → V2 → S3 → V9 → S9 | 0.1488 | 0.2941 |