Research Article

Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

Table 1

The possible range of leaf node failures.

Failure possibility

(IP Table configuration errors)0.300.330.350.370.400.80.9
(address translation failure)0.100.120.150.180.200.91.0
(authentication failure)0.800.900.100.110.120.90.9
(Firewall Daemon configuration errors)0.040.040.050.060.060.80.9
(scan failure)0.110.120.130.140.150.91.0
(cleanse failure)0.100.100.110.120.120.91.0
(audit failure)0.030.040.050.060.070.91.0
(validation failure)0.030.030.040.050.050.91.0
(DNS configuration errors)0.080.090.100.110.120.80.9
(monitor service failure)0.040.040.050.060.060.91.0
(malicious access detected)0.350.370.400.430.450.81.0
(Transport Layer Security configuration errors)0.120.130.140.150.160.80.9
(peer entity authentication)0.150.160.200.240.250.81.0
(security parameter negotiation)0.270.280.300.320.330.80.9
(POP3 configuration errors)0.160.170.180.190.200.80.9
(entity authentication)0.220.240.250.260.280.81.0
(entry security parameter)0.380.390.400.410.420.80.9
(security parameter authentication)0.070.080.090.100.110.81.0
(key generation)0.050.060.070.080.090.80.9
(data confidentiality)0.030.030.040.050.050.90.9