2010 Fourth International Conference on Network and System Security 2010
DOI: 10.1109/nss.2010.80
|View full text |Cite
|
Sign up to set email alerts
|

Risk-Aware Framework for Activating and Deactivating Policy-Based Response

Abstract: With the growth of modern systems and infrastructures, automated and intelligent response systems become the holy grail of the security community. An interesting approach proposes to use dynamic access control policies to specify response policies for such systems. These policies should be enforced when an ongoing attack, that threatens the monitored system, is detected. However, existing work do not present a clear methodology to specify the Response policies. In particular, the deactivation issue is not yet … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…In the simulation scenarios, the sources of the attacks are usually either replayed attacks [5], [6], [7] or simulated attacks based on attack vectors [8], [9]. All of the works evaluate only the strategy performance except for Strasburg et al [6], who evaluate the performance and scalability of the strategy, and Wang et al [9], who vary simulation parameters to test the performance, sensitivity and scalability.…”
Section: Related Workmentioning
confidence: 99%
“…In the simulation scenarios, the sources of the attacks are usually either replayed attacks [5], [6], [7] or simulated attacks based on attack vectors [8], [9]. All of the works evaluate only the strategy performance except for Strasburg et al [6], who evaluate the performance and scalability of the strategy, and Wang et al [9], who vary simulation parameters to test the performance, sensitivity and scalability.…”
Section: Related Workmentioning
confidence: 99%
“…The majority of the proposed IRS use Static Cost or Static Evaluated Cost models (Curtis and Carver, 2001;White et al, 1996;Strasburg et al, 2009;Lee et al, 2002;Stakhanova et al, 2007;Mu and Li, 2010;Wang and Elhag, 2006;Fisch, 1996;Porras and Neumann, 1997;Bowen et al, 2000;Musman and Flesher, 2000;Somayaji and Forrest, 2000;Lewandowski et al, 2001;Schnackenberg et al, 2001;Wang et al, 2001;Tanachaiwiwat et al, 2002;Foo et al, 2005;Papadaki and Furnell, 2006;Kanoun et al, 2010). In contrast, a few models have been presented in the third category, dynamic evaluated cost (Toth and Kregel, 2002;Balepin et al, 2003;Kheir et al, 2010).…”
Section: Intrusion Response Systemmentioning
confidence: 99%
“…Also based on modeling, the risk-aware framework proposed in [18] contains an online component which measures the likelihood of success of an ongoing threat or attack, and the cumulative impacts (cost) of the threat and the response. These measures help the RS determine the need for activation or deactivation of the system's policies as countermeasures.…”
Section: Risk Assessment (Attack Cost)mentioning
confidence: 99%
“…Here, in order to make the IDPRS more precise, risk assessment should be conducted dynamically (online). There are systems in the literature capable of tackling risk assessment in different scenarios, varying from general purpose environments [11,16,17] to complex cyber-physical infrastructures such as the telecommunications industry or the smart grid [18,19].…”
Section: Response Executionmentioning
confidence: 99%
See 1 more Smart Citation