Research Article
Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees
Table 5
Attack path and event probability.
| Attack Path | The Attack Path Composition | Step Count | Interval Probability In This Paper | Event probability of Literature [12] |
| AP1 | SBE12BE1 | 2 | (0.1123,0.2025,0.3187) | 0.1389 | AP2 | BE5BE3BE2 | 5 | (0.0831,0.1811,0.3322) | 0.0473 | AP3 | SBE3BE3BE2 | 3 | (0.2277,0.3417,0.4557) | 0.3167 | AP4 | SBE4BE3BE2 | 3 | (0.4810,0.5950,0.7090) | 0.3750 | AP5 | SBE5BE4BE2 | 3 | (0.4493,0.5633,0.6773) | 0.4544 | AP6 | SBE6BE3BE2 | 3 | (0.2593,0.3733,0.4873) | 0.3194 | AP7 | SBE7BE3BE2 | 3 | (0.2277,0.3417,0.4557) | 0.2639 |
|
|