Attack tree-based evaluation of physical protection systems vulnerability

Z. Vintr, D. Valis, J. Malach
{"title":"Attack tree-based evaluation of physical protection systems vulnerability","authors":"Z. Vintr, D. Valis, J. Malach","doi":"10.1109/CCST.2012.6393538","DOIUrl":null,"url":null,"abstract":"The paper deals with attack tree-based evaluation of vulnerability. The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

The paper deals with attack tree-based evaluation of vulnerability. The Attack tree method was originally developed for the purpose of security modeling in the area of information technologies, but gradually it came to spread also in different areas. Particularly in recent years this analytical method has been dynamically developed, and theoretical boundary conditions for its practical application have been worked out. The paper explains the basic principles of the method, tracks its historical development and describes the present state of method theoretical development and the possibilities of its practical implementation. Special attention is paid to analyzing the possibilities of using this method for the evaluation of the vulnerability of physical protection complex systems. The paper specifies both potential benefits of applying the method, and also limitations the method itself or present knowledge in this area can have. The authors of the paper also propose a couple of ways.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于攻击树的物理防护系统脆弱性评估
本文研究了基于攻击树的漏洞评估方法。攻击树方法最初是为信息技术领域的安全建模而开发的,但逐渐在不同领域得到推广。特别是近年来,这种分析方法得到了动态发展,并为其实际应用制定了理论边界条件。本文阐述了该方法的基本原理,追溯了该方法的历史发展,描述了该方法理论发展的现状和实际实施的可能性。特别注意分析了使用该方法评估物理保护复杂系统脆弱性的可能性。本文详细说明了应用该方法的潜在好处,也说明了该方法本身或该领域现有知识的局限性。该论文的作者还提出了几种方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Department of Defense Instruction 8500.2 “Information Assurance (IA) Implementation:” A retrospective Attack tree-based evaluation of physical protection systems vulnerability Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality A concept of automated vulnerability search in contactless communication applications Working towards an international ANPR Standard — An initial investigation into the UK standard
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1