Research Article

Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees

Table 3

The possibility evaluation of leaf node attribute.

Security Basic EventAttack Cost Probability IntervalAttack Difficulty Probability IntervalDetected Probability  
Interval

SBE1(0.576,0.690,0.804)(0.196,0.310,0.424)(0.196,0.310,0.424)
SBE2(0.006,0.120,0.234)(0.576,0.690,0.804)(0.576,0.690,0.804)
SBE3(0.386,0.500,0.614)(0.006,0.120,0.234)(0.196,0.310,0.424)
SBE4(0.386,0.500,0.614)(0.576,0.690,0.804)(0.576,0.690,0.804)
SBE5(0.576,0.690,0.804)(0.386,0.500,0.614)(0.196,0.310,0.424)
SBE6(0.196,0.310,0.424)(0.386,0.500,0.614)(0.196,0.310,0.424)
SBE7(0.196,0.310,0.424)(0.196,0.310,0.424)(0.386,0.500,0.614)
SBE8(0.196,0.310,0.424)(0.196,0.310,0.424)(0.386,0.500,0.614)
SBE9(0.386,0.500,0.614)(0.196,0.310,0.424)(0.576,0.690,0.804)
SBE10(0.386,0.500,0.614)(0.576,0.690,0.804)(0.386,0.500,0.614)
SBE11(0.576,0.690,0.804)(0.386,0.500,0.614)(0.386,0.500,0.614)
SBE12(0.386,0.500,0.614)(0.386,0.500,0.614)(0.576,0.690,0.804)
SBE13(0.576,0.690,0.804)(0.576,0.690,0.804)(0.386,0.500,0.614)