2008 IEEE International Conference on Signal Image Technology and Internet Based Systems 2008
DOI: 10.1109/sitis.2008.96
|View full text |Cite
|
Sign up to set email alerts
|

Expression and Deployment of Reaction Policies

Abstract: Current prevention techniques provide restrictive responses that may take a local reaction in a limited information system infrastructure. In this paper, an in depth and comprehensive approach is introduced for responding to intrusions in an efficient way. This approach considers not only the threat and the architecture of the monitored information system, but also the security policy. The proposed reaction workflow links the lowest level of the information system corresponding to intrusion detection mechanism… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Then, the module generates the appropriate scripts to reconfigure these PEPs, in order to enforce the activation (or deactivation) of response rules in the monitored system [28]. j) Policy Enforcement Point: These modules are reconfigured, using the scripts generated by the previous module, in order to enforce OrBAC rules, and thus to activate or to deactivate response polices in the monitored system [12], [13].…”
Section: Policies Instantiation Engine (Pie)mentioning
confidence: 99%
See 1 more Smart Citation
“…Then, the module generates the appropriate scripts to reconfigure these PEPs, in order to enforce the activation (or deactivation) of response rules in the monitored system [28]. j) Policy Enforcement Point: These modules are reconfigured, using the scripts generated by the previous module, in order to enforce OrBAC rules, and thus to activate or to deactivate response polices in the monitored system [12], [13].…”
Section: Policies Instantiation Engine (Pie)mentioning
confidence: 99%
“…tactical), the latter has a far larger scope and acts as 'strategic' response model. [12] and [13] show that the two approaches are complementary, and combine them in a single response workflow. Thus, response may be performed at two levels: intermediate level (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…To our best knowledge, OrBAC is the only access control model known in the literature, that offers this expressiveness. As an example, the OrBAC high level policy specification has been used as the final stage in a voice over IP (VoIP) framework in order to definitively react against intrusions [11]. However, OrBAC expresses only contexts over privileges.…”
Section: Introduction and Related Workmentioning
confidence: 99%
“…The taxonomy in [1] thus confirms the need for more complex and dynamic response mechanisms. Cuppens et al propose in [2] a reaction workflow which links the local response decisions to the higher level of security policy. They state that local response decisions should be assisted by global decisions managed at the policy level.…”
Section: Introductionmentioning
confidence: 99%