Research Article
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Figure 3
Graphical representation of the distribution probability distribution method. (a) The threat mapping phase involves automated CTI analysis, specifically the ATT&CK matrix, which has generated the attacker profile. (b) This phase accepts the mapped data for each key technique along with attacker’s capability factor for assigning probability distributions, and it is used to construct code and scripts for attack simulation.