Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Information Assurance 2008
DOI: 10.1016/b978-012373566-9.50015-x
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Response Systems: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…A number of techniques aimed at enhancing intrusion response automation have been proposed and deployed, and a comprehensive review of this research work is given in taxonomies by Natalia Stakhanova [23], and Bingrui Foo [5].…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…A number of techniques aimed at enhancing intrusion response automation have been proposed and deployed, and a comprehensive review of this research work is given in taxonomies by Natalia Stakhanova [23], and Bingrui Foo [5].…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…Hence, it is necessary to decrease the amount of human intervention required by automating some of the tasks commonly carried out by it. In [7,22], it is highlighted that IPS and Intrusion Response Systems (IRS) may require human tuning in order to decide which preventive actions to enable/disable for which type of alert. This tuning ensures that undesired reactive actions that may compromise the behaviour of the underlying system are not executed.…”
Section: Configurability and Automatic Or Semi-automatic Reactions Tomentioning
confidence: 99%
“…Network intrusion response mechanisms have been intensively studied in recent years due to their importance in cyber security. Some scholars design automated response mechanism to deploy the appropriate responses . Considering the conflicting interests of the decision makers, game theoretical approach is used by many researchers to find strategies for both the defender and the attacker.…”
Section: Related Workmentioning
confidence: 99%
“…Network intrusion response mechanisms have been intensively studied in recent years due to their importance in cyber security. Some scholars design automated response mechanism to deploy the appropriate responses [13][14][15][16].…”
Section: Related Workmentioning
confidence: 99%