2013
DOI: 10.1155/2013/134760
|View full text |Cite
|
Sign up to set email alerts
|

A Retroactive-Burst Framework for Automated Intrusion Response System

Abstract: The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC) mechanism, the main con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 11 publications
0
6
0
1
Order By: Relevance
“…The finite states machine (FSM) model is used in [22] to design a multi-attack response system. The model sends an alert only after there is a state change without predicting the whole attack path.…”
Section: Related Workmentioning
confidence: 99%
“…The finite states machine (FSM) model is used in [22] to design a multi-attack response system. The model sends an alert only after there is a state change without predicting the whole attack path.…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection systems analyze network packets and look at their payload to find and detect attack signatures. Similar to intrusion detection systems, trace analysis tools, upon detecting such a problematic pattern, may generate an alarm or even trigger an automatic response (eg, killing a process and rebooting the system) …”
Section: Multilevel Trace Abstraction Techniquesmentioning
confidence: 99%
“…1 Similar to intrusion detection systems, trace analysis tools, upon detecting such a problematic pattern, may generate an alarm or even trigger an automatic response (eg, killing a process and rebooting the system). 68 One of the other techniques to reduce trace complexity and improve understanding is visualization. A proper visualization, specially multi-scale visualization, can significantly help to alleviate big data analysis problems, as investigated in the next section.…”
Section: Applications Of Trace Abstraction Techniquesmentioning
confidence: 99%
“…Recently, a hot research topic in the protection strategies for ICS has been to focus on the active protection, which implements active protection strategies based on the risk assessment on the current security risk of the ICS. Shameli-Sendi et al proposed a retrospective burst response method based on an adaptive and cost-sensitive model [ 16 ]. This method takes into account the effectiveness of the application response.…”
Section: Introductionmentioning
confidence: 99%