2006
DOI: 10.1007/11610496_139
|View full text |Cite
|
Sign up to set email alerts
|

A New Automatic Intrusion Response Taxonomy and Its Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…However, identifying an intrusion is just half the battle, knowing how to respond is equally essential. Once a suspicious activity has been detected, it is desirable to have an automated resource capable of taking appropriate steps to mitigate the damage caused by the attack [96]. The alert description dimension shows that the researchers also need to pay attention to the IDS which provides the context of the generated alerts.…”
Section: Comparison Of Idsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, identifying an intrusion is just half the battle, knowing how to respond is equally essential. Once a suspicious activity has been detected, it is desirable to have an automated resource capable of taking appropriate steps to mitigate the damage caused by the attack [96]. The alert description dimension shows that the researchers also need to pay attention to the IDS which provides the context of the generated alerts.…”
Section: Comparison Of Idsmentioning
confidence: 99%
“…automated resource capable of taking appropriate steps to mitigate the damage caused by the attack [96]. The alert description dimension shows that the researchers also need to pay attention to the IDS which provides the context of the generated alerts.…”
Section: Fig1 Intrusion Detection System Dimensionsmentioning
confidence: 99%