A Planning-Based Method of Risk Process Modeling for Information Security

Wang Zhen-zhen,Wu Xiao-yue,Liu Zhong,Tan Xu,Cheng Feng
DOI: https://doi.org/10.1109/icacte.2008.45
2008-01-01
Abstract:To evaluate the information security risk, an approach called PISRPMA is proposed to model the risk process of Information Security. PISRPMA describes risk domain and risk problem in PDDL language, reasons all exploitation paths using relative algorithms and builds a Planning Exploitation Graph to model the risk process. The experiment shows that this method has the features of formalization and scalability, and is a good solution for risk process modeling for information security.
What problem does this paper attempt to address?