Model the system security risk by an attack tree
dc.contributor.author | Poolsappasit, Nayot, author | |
dc.contributor.author | Edwards, John, author | |
dc.contributor.author | Ray, Indrajit, author | |
dc.date.accessioned | 2007-01-03T06:48:56Z | |
dc.date.available | 2007-01-03T06:48:56Z | |
dc.date.issued | 2006 | |
dc.description.abstract | Traditional Vulnerabilities scanners only give a list of vulnerabilities of the systems. This one dimensional information does not give analysts the perception of how exploits can be chained together and form more complex attack scenarios. We are developing an automate tool that takes the list of vulnerabilities and generates all possible attack scenarios known to the current security intellectual in the form of an attack tree model. | |
dc.format.medium | born digital | |
dc.format.medium | Student works | |
dc.format.medium | posters | |
dc.identifier | COFISTeC2006012.pdf | |
dc.identifier | STUFISTC2006100012POST | |
dc.identifier.uri | http://hdl.handle.net/10217/89370 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | Student Research Posters | |
dc.rights | Copyright and other restrictions may apply. User is responsible for compliance with all applicable laws. For information about copyright law, please see https://libguides.colostate.edu/copyright. | |
dc.subject | vulnerability | |
dc.subject | security breaches | |
dc.subject | attack tree | |
dc.subject | computer security | |
dc.title | Model the system security risk by an attack tree | |
dc.type | Text | |
thesis.degree.discipline | Computer Science | |
thesis.degree.discipline | Natural Sciences |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- COFISTeC2006012.pdf
- Size:
- 708.52 KB
- Format:
- Adobe Portable Document Format
- Description: