Vulnerability-based information security risk assessment using attack tree

Yong Wang


information security, attack tree, risk assessment, vulnerability


In reviewing different security risk assessment methods, we developed a tree-based security assessment model based on vulnerability reports. Using an attack tree in a Unix login account as an example, we analyzed attack trees, resulting in experimental indication that the attack-tree-based risk assessment is more efficient than direct security risk assessment

Important Links:

Go Back