Documente Academic
Documente Profesional
Documente Cultură
discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/221195622
CITATIONS
DOWNLOADS
VIEWS
70
128
4 AUTHORS, INCLUDING:
Xiaobin Tan
University of Science and Technology of Ch
27 PUBLICATIONS 53 CITATIONS
SEE PROFILE
I.
INTRODUCTION
II.
RELATED WORK
RISK = R( A, T , V ) = R ( L(T , V ), F (I a , Va ))
(1)
Figure 1.
Figure 2.
(2)
(3)
v
1(
t
2(
v
2(
t
n(
v
n(
s(k ) = (s k ) * s k ), s k ) * s k ),", s k ) * s k ))
(5)
t
v
p(s(k + 1) | s(k ), u , u )V (s(k + 1)) (6)
s(k + 1)
Action Space --- For the threat agent, we say one spread of
the threat as its one action. The threat can be transmitted to
other assets with certain probability which is given in the state
transition rule. For simplifying the spread process of threat, we
assume that the threat is spread to one asset once. In order to
distinguish the main spread threat, we define source asset s and
destination asset d.
R( s(k )) = VA s (k )
(7)
(8)
(9)
(10)
value at risk
Vsys = Vi
45
40
35
30
25
20
15
10
5
0
VS:(1,1,1)
V ( s (k )) = min max Vt , v ( s( k ))
v V t T
VS:(1,0,1)
value at risk
45
40
35
30
25
20
15
10
5
0
VS:(1,1,1)
Figure 5.
30
value at risk
V.
(11)
25
20
15
10
5
0
Figure 6.
From Figure 4, we can see that the two VS have the same
value at risk when threat state is (0,0,1), (0,1,1), (1,0,1). The
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Threat state
Vulnerability state
ACKNOWLEDGMENT
000
001
010
011
100
101
110
111
000
001
010
011
100
101
110
111
[10]
[11]
[12]
[13]
[14]
Figure 7.
VI.
Repair table
CONCLUSIONS
[15]
[16]
[17]
[18]
[19]
[20]