2020 International Conference on Computing, Networking and Communications (ICNC) 2020
DOI: 10.1109/icnc47757.2020.9049740
|View full text |Cite
|
Sign up to set email alerts
|

On the Effectiveness of Intrusion Response Systems against Persistent Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Li et al 16 gave an approach to dynamic decision making for intrusion response that uses the Pareto‐optimal set to deal with it. In Reference 17, Sharif Ullah et al formulated the interactions between the attacker and the defender as an attack graph and an object instance graph, and they discouraged further intrusions by increasing the uncertainty of subsequent attacks and the cost of time and space by the attacker. However, when modeling the defense strategy, these studies only considered the maximum gain under the current state faced by the defender and ignored that the process of intrusion response is a process of constant interaction between the attacker and the defender, which causes the model to fall into the locally optimal solution.…”
Section: Related Workmentioning
confidence: 99%
“…Li et al 16 gave an approach to dynamic decision making for intrusion response that uses the Pareto‐optimal set to deal with it. In Reference 17, Sharif Ullah et al formulated the interactions between the attacker and the defender as an attack graph and an object instance graph, and they discouraged further intrusions by increasing the uncertainty of subsequent attacks and the cost of time and space by the attacker. However, when modeling the defense strategy, these studies only considered the maximum gain under the current state faced by the defender and ignored that the process of intrusion response is a process of constant interaction between the attacker and the defender, which causes the model to fall into the locally optimal solution.…”
Section: Related Workmentioning
confidence: 99%
“…This allows for automated network reconfiguration as a means of mitigation during an incident. With similar motivations, Ullah et al, [157] model an intrusion response system through the consideration of diverse attacker strategies. This model explores potential attack pathways, from which a response mechanism is designed to restrict attacker opportunities.…”
Section: Related Workmentioning
confidence: 99%