2015
DOI: 10.1016/j.jnca.2015.05.004
|View full text |Cite
|
Sign up to set email alerts
|

ORCEF: Online response cost evaluation framework for intrusion response system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 28 publications
0
12
0
1
Order By: Relevance
“…In [25], Shameli-Sendi et al proposed a dynamic response cost model for intrusion response system, which is based on service dependency graph. The type of attack (User-to-Root, Remote-to-Local, Denial of Service, and Probe), was used to calculate the attack damage cost, statically.…”
Section: B Service Dependency Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…In [25], Shameli-Sendi et al proposed a dynamic response cost model for intrusion response system, which is based on service dependency graph. The type of attack (User-to-Root, Remote-to-Local, Denial of Service, and Probe), was used to calculate the attack damage cost, statically.…”
Section: B Service Dependency Graphmentioning
confidence: 99%
“…We can evaluate the response cost online based on the dependencies between services and online users. For example, the impact of terminating a dangerous process varies with the number of dependencies of other resources on the dangerous process, and the number of online users [25]. If the cost of terminating the process is high, maybe another response is better and should be selected.…”
Section: Accepted Manuscript D Response Selection Modelmentioning
confidence: 99%
“…The relationships are defined as privileges, which have been granted to the dependent service from the antecedent one. The dependencies can reveal how a dependent service can be affected in terms of confidentiality, integrity, and availability, if a related service faces an intrusive incident [104]. However, identifying and representing the interdependences of all the services in an infrastructure can be proved a cumbersome task, which in turn can lead to inefficiencies.…”
Section: Features For Comparison Of Workmentioning
confidence: 99%
“…Description The work in [104] presents a model able to dynamically evaluate the positive and negative effects of defense actions on a system under attack. The problem of providing defense actions which maximize the security performance but simultaneously minimize the negative effects of the applied measures is treated as a MOOP.…”
Section: Shameli-sendi and Dagenais [104]mentioning
confidence: 99%
See 1 more Smart Citation