Intrusion Response Systems: A Survey

作者: J JOSHI

DOI: 10.1016/B978-0-12-374463-0.00010-2

关键词: Computer securityIntrusion toleranceDynamic decision-makingBenchmarkingComputer scienceCommunications protocolFocus (computing)Key (cryptography)Class (computer programming)Field (computer science)

摘要: Publisher Summary This chapter considers the distributed systems as composed of multiple services and interact with one another through standardized network protocols. It describes primary Intrusion Response Systems (IRSs) label each in following four categories. IRSs, called static decision making, provides a mapping alert from detector to response that is be deployed. The second class, dynamic reasons about an ongoing attack based on observed alerts determines appropriate take. third intrusion tolerance diverse replicas, masking security failures use replicas concurrently for performing critical functions. fourth class includes IRSs meant target specific kinds attacks, our focus being denial-of-service attacks. Then, we present discussion nascent field benchmarking IRSs. Finally, presents five key areas which need evolve widespread adoption. In addition, it metrics are relevant evaluating IRS.

参考文章(41)
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
D. Schnackenberg, K. Djahandari, D. Sterne, Infrastructure for intrusion detection and response darpa information survivability conference and exposition. ,vol. 2, pp. 3- 11 ,(2000) , 10.1109/DISCEX.2000.821505
Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl Levitt, Using specification-based intrusion detection for Automated response recent advances in intrusion detection. pp. 136- 154 ,(2003) , 10.1007/978-3-540-45248-5_8
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, Erez Zadok, Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. ,vol. 10, pp. 5- 22 ,(2002) , 10.3233/JCS-2002-101-202
J.H. Lala, Intrusion tolerant systems pacific rim international symposium on dependable computing. pp. 3- 3 ,(2000) , 10.1109/PRDC.2000.897277
D. Armstrong, G. Frazier, S. Carter, T. Frazier, A controller-based autonomic defense system darpa information survivability conference and exposition. ,vol. 2, pp. 21- 23 ,(2003) , 10.1109/DISCEX.2003.1194902
S. Jha, J. Wing, R. Linger, T. Longstaff, Survivability analysis of network specifications dependable systems and networks. pp. 613- 622 ,(2000) , 10.1109/ICDSN.2000.857597
Matthew C. Rixon, Jonathan D. Goding, Randall S. Brooks, Network intrusion prevention ,(2005)
F.B. Schneider, Lidong Zhou, Implementing trustworthy services using replicated state machines ieee symposium on security and privacy. ,vol. 3, pp. 34- 43 ,(2005) , 10.1109/MSP.2005.125