Skip to main content

Advances, Systems and Applications

Table 9 Calculation process of the attack scenario for simulated path 1

From: A new method of dynamic network security analysis based on dynamic uncertain causality graph

Candidate Paths

Posterior Probability of Attack Paths

Probability Normalization

B1(BX1) → V1 → S2 → V5 → S8 → V13 → S9

0.0654

0.1293

B1(BX1) → V1 → S2 → V3 → S4 → V6 → S6 → V11 → S8 → V13 → S9

0.1792

0.3542

B1(BX1) → V1 → S2 → V4 → S5 → V7 → S6 → V11 → S8 → V13 → S9

0.0249

0.0492

B1(BX1) → V1 → S2 → V4 → S5 → V8 → S7 → V12 → S8 → V13 → S9

0.0025

0.0049

B1(BX1) → V1 → S2 → V3 → S5 → V10 → S8 → V13 → S9

0.0261

0.0516

BX1 → V1 → S2 → V4 → S5 → V9 → S9

0.0589

0.1164

BX1 → V2 → S3 → V9 → S9

0.1488

0.2941