Repository logo
 

Model the system security risk by an attack tree

dc.contributor.authorPoolsappasit, Nayot, author
dc.contributor.authorEdwards, John, author
dc.contributor.authorRay, Indrajit, author
dc.date.accessioned2007-01-03T06:48:56Z
dc.date.available2007-01-03T06:48:56Z
dc.date.issued2006
dc.description.abstractTraditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex attack scenarios. We are developing an automate tool that takes the list of vulnerabilities and generates all possible attack scenarios known to the current security intellectual in the form of an attack tree model.
dc.format.mediumborn digital
dc.format.mediumStudent works
dc.format.mediumposters
dc.identifierCOFISTeC2006012.pdf
dc.identifierSTUFISTC2006100012POST
dc.identifier.urihttp://hdl.handle.net/10217/89370
dc.languageEnglish
dc.language.isoeng
dc.publisherColorado State University. Libraries
dc.relation.ispartofStudent Research Posters
dc.rightsCopyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright.
dc.subjectvulnerability
dc.subjectsecurity breaches
dc.subjectattack tree
dc.subjectcomputer security
dc.titleModel the system security risk by an attack tree
dc.typeText
thesis.degree.disciplineComputer Science
thesis.degree.disciplineNatural Sciences

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
COFISTeC2006012.pdf
Size:
708.52 KB
Format:
Adobe Portable Document Format
Description: