{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T21:31:56Z","timestamp":1773869516262,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:00:00Z","timestamp":1706054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:00:00Z","timestamp":1706054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176240"],"award-info":[{"award-number":["62176240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176240"],"award-info":[{"award-number":["62176240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation and real-time reflection of the network attack events, and high computational complexity for attack analysis. To solve these problems, this study proposes a Dynamic Uncertain Causal Attack Graph (DUCAG) model and a Causal Chain-based Risk Probability Calculation (CCRP) algorithm. The DUCAG model is constructed to represent the uncertain underlying causalities among network attack events, and the CCRP algorithm aims at dynamically updating the causality weights among different network attack events and attacker hypotheses based on alarm information and causal chain reasoning process. By causality simplification and causality reasoning methods, the CCRP efficiently predicts the attacker behaviors and potential attack likelihood under uncertain time-varying attack situations, and is robust to the incompleteness and redundancy in alarm information. Four experiments under different attack scenarios demonstrate that, the DUCAG model can effectively characterize and predict the complex and uncertain attack causalities, in a manner of high time\u00a0efficiency. The proposed method has application significance on cloud computing platforms by dynamically evaluating network security status, predicting the future behaviors of attackers, and assisting in adjusting network defense strategies.<\/jats:p>","DOI":"10.1186\/s13677-023-00568-7","type":"journal-article","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T10:02:20Z","timestamp":1706090540000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A new method of dynamic network security analysis based on dynamic uncertain causality graph"],"prefix":"10.1186","volume":"13","author":[{"given":"Chunling","family":"Dong","sequence":"first","affiliation":[]},{"given":"Yu","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Wenqian","family":"Shang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,24]]},"reference":[{"issue":"10","key":"568_CR1","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1109\/JSAC.2023.3310077","volume":"41","author":"L Qi","year":"2023","unstructured":"Qi L, Xu X, Wu X, Ni Q, Yuan Y, Zhang X (2023) Digital-Twin-Enabled 6G Mobile Network Video Streaming Using Mobile Crowdsourcing. IEEE J Sel Areas Commun 41(10):3161\u20133174","journal-title":"IEEE J Sel Areas Commun"},{"key":"568_CR2","doi-asserted-by":"crossref","unstructured":"Miao Y, Bai X, Cao Y, Liu Y, Dai F, Wang F, et al (2023) A Novel Short-Term Traffic Prediction Model Based on SVD and ARIMA With Blockchain in Industrial Internet of Things. IEEE Internet Things J 10(24):21217\u201326","DOI":"10.1109\/JIOT.2023.3283611"},{"key":"568_CR3","doi-asserted-by":"crossref","unstructured":"Kong L, Li G, Rafique W, Shen S, He Q, Khosravi MR, et al (2022) Time-Aware Missing Healthcare Data Prediction Based on ARIMA Model. IEEE\/ACM Trans Comput Biol Bioinform 2022:1\u201310","DOI":"10.1109\/TCBB.2022.3205064"},{"key":"568_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-020-00825-8","volume":"2021","author":"F Wang","year":"2021","unstructured":"Wang F, Wang L, Li G, Wang Y, Lv C, Qi L (2021) Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation. World Wide Web 2021:1\u201321","journal-title":"World Wide Web"},{"issue":"4","key":"568_CR5","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1109\/TCSS.2021.3064213","volume":"9","author":"F Wang","year":"2021","unstructured":"Wang F, Zhu H, Srivastava G, Li S, Khosravi MR, Qi L (2021) Robust collaborative filtering recommendation with user-item-trust records. IEEE Trans Comput Soc Syst 9(4):986\u2013996","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"11","key":"568_CR6","doi-asserted-by":"publisher","first-page":"9268","DOI":"10.1109\/JIOT.2021.3057045","volume":"8","author":"Y Fan","year":"2021","unstructured":"Fan Y, Zhao G, Lei X, Liang W, Li K-C, Choo K-KR et al (2021) SBBS: A secure blockchain-based scheme for IoT data credibility in fog environment. IEEE Internet Things J 8(11):9268\u20139277","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"568_CR7","doi-asserted-by":"publisher","first-page":"176","DOI":"10.23919\/JCC.ea.2020-0684.202302","volume":"20","author":"Y Fan","year":"2023","unstructured":"Fan Y, Zhang W, Bai J, Lei X, Li K (2023) Privacy-preserving deep learning on big data in cloud. China Communications 20(11):176\u2013186","journal-title":"China Communications"},{"issue":"6","key":"568_CR8","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1016\/j.dcan.2022.04.001","volume":"8","author":"MPJ Mahenge","year":"2022","unstructured":"Mahenge MPJ, Li C, Sanga CA (2022) Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications. Digital Communications and Networks 8(6):1048\u20131058","journal-title":"Digital Communications and Networks"},{"key":"568_CR9","unstructured":"Qi L, Lin W, Zhang X, Dou W, Xu X, Chen J (2023) A Correlation Graph Based Approach for Personalized and Compat-ible Web APIs Recommendation in Mobile APP Development. IEEE Trans Knowl Data Eng 35(6):5444\u201357"},{"issue":"1","key":"568_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.dcan.2021.02.002","volume":"8","author":"W Song","year":"2022","unstructured":"Song W, Wu Y, Cui Y, Liu Q, Shen Y, Qiu Z et al (2022) Public integrity verification for data sharing in cloud with asynchronous revocation. Digit Commun Netw 8(1):33\u201343","journal-title":"Digit Commun Netw"},{"issue":"5","key":"568_CR11","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/j.dcan.2022.04.036","volume":"8","author":"H Han","year":"2022","unstructured":"Han H, Fei S, Yan Z, Zhou X (2022) A survey on blockchain-based integrity auditing for cloud data. Digit Commun Netw 8(5):591\u2013603","journal-title":"Digit Commun Netw"},{"issue":"5","key":"568_CR12","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1109\/TNSE.2022.3157730","volume":"10","author":"Y Yang","year":"2023","unstructured":"Yang Y, Yang X, Heidari M, Khan MA, Srivastava G, Khosravi MR et al (2023) ASTREAM: Data-Stream-Driven Scalable Anomaly Detection With Accuracy Guarantee in IIoT Environment. IEEE Trans Netw Sci Eng 10(5):3007\u20133016","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"6","key":"568_CR13","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1016\/j.dcan.2022.11.005","volume":"8","author":"S Zhang","year":"2022","unstructured":"Zhang S, Liu C, Li X, Han Y (2022) Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments. Digit Commun Netw 8(6):1014\u20131026","journal-title":"Digit Commun Netw"},{"issue":"4","key":"568_CR14","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.dcan.2021.07.005","volume":"8","author":"Z Xu","year":"2022","unstructured":"Xu Z, Zhu D, Chen J, Yu B (2022) Splitting and placement of data-intensive applications with machine learning for power system in cloud computing. Digit Commun Netw 8(4):476\u2013484","journal-title":"Digit Commun Netw"},{"key":"568_CR15","doi-asserted-by":"crossref","unstructured":"Kong L, Wang L, Gong W, Yan C, Duan Y, Qi L (2021) LSH-aware multitype health data prediction with privacy preservation in edge environment. World Wide Web 2021:1\u201316","DOI":"10.1007\/s11280-021-00941-z"},{"issue":"3","key":"568_CR16","first-page":"1","volume":"23","author":"F Wang","year":"2023","unstructured":"Wang F, Li G, Wang Y, Rafique W, Khosravi MR, Liu G et al (2023) Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city. ACM Trans Internet Technol 23(3):1\u201319","journal-title":"ACM Trans Internet Technol"},{"key":"568_CR17","doi-asserted-by":"crossref","unstructured":"Wang X, Sun Y, Ding D (2023) Adaptive dynamic programming for networked control systems under communication constraints: a survey of trends and techniques. Int J Netw Dyn Intell\u00a02023:85\u201398","DOI":"10.53941\/ijndi0101008"},{"issue":"10","key":"568_CR18","doi-asserted-by":"publisher","first-page":"4239","DOI":"10.1109\/TNNLS.2019.2953177","volume":"31","author":"C Dong","year":"2020","unstructured":"Dong C, Zhang Q (2020) The cubic dynamic uncertain causality graph: A methodology for temporal process modeling and diagnostic logic inference. IEEE Trans Neural Netw Learn Syst 31(10):4239\u20134253","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"2","key":"568_CR19","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TR.2022.3170063","volume":"72","author":"C Dong","year":"2023","unstructured":"Dong C, Zhou J (2023) A new algorithm of cubic dynamic uncertain causality graph for speeding up temporal causality inference in fault diagnosis. IEEE Trans Reliab 72(2):662\u2013677","journal-title":"IEEE Trans Reliab"},{"issue":"4","key":"568_CR20","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNNLS.2013.2279320","volume":"25","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Dong C, Yan C, Yang Z (2014) Dynamic Uncertain Causality Graph for knowledge representation and probabilistic reasoning: statistics base, matrix, and application. IEEE Trans Neural Netw Learn Syst 25(4):645\u2013663","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"568_CR21","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TR.2018.2822479","volume":"67","author":"C Dong","year":"2018","unstructured":"Dong C, Zhou Z, Zhang Q (2018) Cubic dynamic uncertain causality graph: A new methodology for modeling and reasoning about complex faults with negative feedbacks. IEEE Trans Reliab 67(3):920\u2013932","journal-title":"IEEE Trans Reliab"},{"key":"568_CR22","doi-asserted-by":"crossref","unstructured":"Phillips C, Swiler LP (1998) A graph-based system for network-vulnerability analysis. Proceedings of the 1998 workshop on New security paradigms 1998:71\u201379","DOI":"10.1145\/310889.310919"},{"issue":"4","key":"568_CR23","first-page":"110","volume":"38","author":"W Xiu-juan","year":"2015","unstructured":"Xiu-juan W, Bo S, Yan-wen L, Cong-bin X (2015) Computer network vulnerability assessment based on Bayesian attribute network. J Beijing University Posts Telecommunications 38(4):110","journal-title":"J Beijing University Posts Telecommunications"},{"issue":"1","key":"568_CR24","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N Poolsappasit","year":"2011","unstructured":"Poolsappasit N, Dewri R, Ray I (2011) Dynamic security risk management using bayesian attack graphs. IEEE Trans Dependable Secure Comput 9(1):61\u201374","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"12","key":"568_CR25","first-page":"2620","volume":"55","author":"S Wang","year":"2018","unstructured":"Wang S, Tang G, WANG J (2018) Attack scenario construction method based on causal knowledge net. J Comput Res Develop 55(12):2620\u20132636","journal-title":"J Comput Res Develop"},{"issue":"1","key":"568_CR26","first-page":"1","volume":"42","author":"W Wang","year":"2021","unstructured":"Wang W, Du X, SHAN D, (2021) Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph. J Communications 42(1):1\u201317","journal-title":"J Communications"},{"issue":"Springer","key":"568_CR27","first-page":"283","volume":"22","author":"L Wang","year":"2008","unstructured":"Wang L, Islam T, Long T, Singhal A, Jajodia S (2008) An attack graph-based probabilistic security metric. Data and Applications Security XXII: 22nd Annual IFIP WG 113 Working Conference on Data and Applications Security London, UK. Proceedings 22(Springer):283\u201396","journal-title":"Proceedings"},{"issue":"10","key":"568_CR28","first-page":"1987","volume":"33","author":"Y Ye","year":"2010","unstructured":"Ye Y, Xu X-S, Jia Y, Qi Z-C (2010) An attack graph-based probabilistic computing approach of network security. Jisuanji Xuebao (Chinese J Comput) 33(10):1987\u20131996","journal-title":"Jisuanji Xuebao (Chinese J Comput)"},{"issue":"10","key":"568_CR29","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCSE.2010.13","volume":"32","author":"F Chen","year":"2010","unstructured":"Chen F, Zhang Y (2010) Research of quantitative vulnerability assessment based on attack graphs. Comput Eng Sci 32(10):8\u201311","journal-title":"Comput Eng Sci"},{"key":"568_CR30","doi-asserted-by":"crossref","unstructured":"Ammann P, Wijesekera D, Kaushik S (2002) Scalable, graph-based network vulnerability analysis. Proceedings of the 9th ACM Conference on Computer and Communications Security\u00a02002:217\u201324","DOI":"10.1145\/586110.586140"},{"key":"568_CR31","volume-title":"Research on network vulnerability assessment and intrusion alert analysis technology","author":"X Liu","year":"2011","unstructured":"Liu X (2011) Research on network vulnerability assessment and intrusion alert analysis technology. Ph.D. Thesis, Huazhong Normal University, China"},{"issue":"03","key":"568_CR32","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/s10915-021-01740-4","volume":"49","author":"J Li","year":"2022","unstructured":"Li J, Ling X, Li C, Li Z, Yang J, Zhang L (2022) Dynamic network security analysis based on bayesian attack graph. Computer Sci 49(03):62\u201369","journal-title":"Computer Sci"},{"issue":"4","key":"568_CR33","first-page":"831","volume":"55","author":"H Hu","year":"2018","unstructured":"Hu H, Liu Y, Zhang H, Yang Y, Ye R (2018) Route prediction method for network intrusion using absorbing Markov chain. J Comput Res Development 55(4):831\u2013845","journal-title":"J Comput Res Development"},{"issue":"7","key":"568_CR34","first-page":"1","volume":"20","author":"N Jiang","year":"2020","unstructured":"Jiang N, Cui Y, Wang J, Wu J (2020) Context-based Attack Scenario Reconstruction Model for IDS Alarms. Netinfo Security 20(7):1\u201310","journal-title":"Netinfo Security"},{"issue":"22","key":"568_CR35","first-page":"73","volume":"55","author":"Y Wang","year":"2019","unstructured":"Wang Y, Wu J, Huang J, Hu H, Liu Y (2019) Network Intrusion Intention Recognition Method Based on Bayesian Attack Graph. Comput Eng Appl 55(22):73\u201379","journal-title":"Comput Eng Appl"},{"issue":"1","key":"568_CR36","first-page":"62","volume":"37","author":"X Chen","year":"2014","unstructured":"Chen X, Fang B, Tan Q, Zhang H (2014) Inferring attack intent of malicious insider based on probabilistic attack graph model. Chinese J Comput 37(1):62\u201372","journal-title":"Chinese J Comput"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00568-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00568-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00568-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T10:13:42Z","timestamp":1706091222000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00568-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,24]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["568"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00568-7","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,24]]},"assertion":[{"value":"15 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"24"}}