2008 Third International Conference on Risks and Security of Internet and Systems 2008
DOI: 10.1109/crisis.2008.4757471
|View full text |Cite
|
Sign up to set email alerts
|

Automated reaction based on risk analysis and attackers skills in intrusion detection systems

Abstract: International audienceNowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
14
0
3

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(17 citation statements)
references
References 13 publications
0
14
0
3
Order By: Relevance
“…The attack graph serves as a correlation mechanism to determine the false negative and positive alarms. It not only correlates the intrusion detection system outputs [30], [31], but also helps the intrusion response system to apply responses in a timely fashion, at the right place, and with the appropriate intensity [32], [33]. Note that our dynamic attack graph is based on service vulnerabilities.…”
Section: E False Alarmsmentioning
confidence: 99%
“…The attack graph serves as a correlation mechanism to determine the false negative and positive alarms. It not only correlates the intrusion detection system outputs [30], [31], but also helps the intrusion response system to apply responses in a timely fashion, at the right place, and with the appropriate intensity [32], [33]. Note that our dynamic attack graph is based on service vulnerabilities.…”
Section: E False Alarmsmentioning
confidence: 99%
“…The proposed approach systematically integrates attack graphs and Hidden Markov Models together for exploring the probabilistic relation between system observations and state. Kanoun et al [10] presented a risk assessment model based on attack graphs to evaluate the severity of the total risk of the monitored system. The LAMBDA [11] language is used to model attack graphs when an attack is detected.…”
Section: Related Workmentioning
confidence: 99%
“…This type of evaluation is very limited and is not sufficient. It is used also by Kanoun et al [4], however, the authors are preparing for a more extensive evaluation in a live deployment.…”
Section: Related Workmentioning
confidence: 99%