Research Article
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Table 4
Comparison of experimental methods of several TMS models.
| Method | Security engineering | Attack intent inference | Attack path inference | Uncertainty analysis | Tactic, technique | Attacker features |
| P2CySeMoL [41] | | | ✓ | ✓ | | | pwnPr3d [42] | | | ✓ | ✓ | | | SecML [43] | | ✓ | | | ✓ | | FMMLx [40] | ✓ | ✓ | ✓ | | | | BPATSM [44] | ✓ | ✓ | | | | | PowerLang [17] | ✓ | ✓ | ✓ | | | | CoreLang [18] | ✓ | ✓ | ✓ | | | | EnterpriseLang [16, 45] | ✓ | ✓ | ✓ | ✓ | | | IoTsecM [46] | ✓ | | | | ✓ | | TRMLang | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|