2007
DOI: 10.1007/s11416-007-0039-z
|View full text |Cite
|
Sign up to set email alerts
|

Enabling automated threat response through the use of a dynamic security policy

Abstract: Information systems security issues are currently being addressed using different techniques, such as authentication, encryption and access control, through the definition of security policies, but also using monitoring techniques, in particular intrusion detection systems. We can observe that security monitoring is currently totally decorrelated from security policies, that is security requirements are not linked with the means used to control their fulfillment. Most of the time, security operators have to an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0
2

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 39 publications
(39 citation statements)
references
References 22 publications
0
37
0
2
Order By: Relevance
“…Tarek Bouyahia etl [21], proposed also a context aware intrusion response based on argumentation logic. Herve Debar elt [22], proposed an advanced security policy formalism, to define a contextual security policy that will be applied to the information system.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Tarek Bouyahia etl [21], proposed also a context aware intrusion response based on argumentation logic. Herve Debar elt [22], proposed an advanced security policy formalism, to define a contextual security policy that will be applied to the information system.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Declarative languages are also widely used for specifying and maintaining security policies [3,8,7]. Debar et al [7] describes an architecture for specifying generic security policies in Datalog.…”
Section: Using Declarative Languagesmentioning
confidence: 99%
“…Debar et al [7] describes an architecture for specifying generic security policies in Datalog. Whenever new threats are detected, the policies may react to the threat and enable security rules such as prohibiting TCP/IP traffic for its web servers when syn-flooding attack occurs.…”
Section: Using Declarative Languagesmentioning
confidence: 99%
“…Proposals like [18] and [19] deal with the deployment of reactive policies to neutralize security threats. In [19], the threats are modeled as contexts.…”
Section: Policy Based Network Managementmentioning
confidence: 99%
“…Then, standard IDMEF alerts are mapped to the contexts. In [18], not only contexts but new policy instances are derived as a result of an alert. The authors discuss about context lifetime, according to the impact severity and type of an alert.…”
Section: Policy Based Network Managementmentioning
confidence: 99%