Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004.
DOI: 10.1109/csfw.2004.1310733
|View full text |Cite
|
Sign up to set email alerts
|

Selecting appropriate counter-measures in an intrusion detection framework

Abstract: Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design effective response techniques to circumvent intrusions when they are detected. Our approach is based on a library that implements different types of counter-measures. The idea is to design a decision support tool to help the administrator to choose, in this library, the appropriate counter-measure when a given intrusion occurs. For this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…The DIAMS platform, presented in Cuppens et al [8], provides response generation mechanisms for detected attacks. The authors state that not only is intrusion detection important for a safe environment, but also the existence of efficient response mechanisms to deal with the detected intrusions.…”
Section: Related Studiesmentioning
confidence: 99%
“…The DIAMS platform, presented in Cuppens et al [8], provides response generation mechanisms for detected attacks. The authors state that not only is intrusion detection important for a safe environment, but also the existence of efficient response mechanisms to deal with the detected intrusions.…”
Section: Related Studiesmentioning
confidence: 99%
“…We assume in this approach that intrusion detection systems and alert correlation techniques allow a clear identification of the threat, including the threat type (typically represented by a set of signatures and references to vulnerability databases), the threat origin (represented in most cases by an IP address), and the threat victim (represented by a host under our control, a process, or any set of components of our information system), as in [6] for example. As shown in [7], it is indeed possible to use configuration information to adapt the detection mechanism to its environment, thus ensuring that contextual information in the alerts is exhaustive and correct.…”
Section: Comprehensive Approach To Threat Responsementioning
confidence: 99%
“…A game theoretic approach is presented by Alpcan and Basar [20] who use cooperative game theory for analysis and configuration purposes and, additionally, bring a two-person finite game into play when modeling the interaction between the IDS and the attacker. Next, Cuppens et al [21], [22] present a data-based approach using logical representations of intrusions and countermeasures. Their LAMBDA (Language to Model a database for Detection of Attacks) aims at building libraries of attacks and countermeasures in order to later-on use anti-correlation when searching for a proper combination of responses to a given threat.…”
Section: B Decision Support For Securitymentioning
confidence: 99%