A taxonomy of intrusion response systems

作者: Natalia Stakhanova , Samik Basu , Johnny Wong

DOI: 10.1504/IJICS.2007.012248

关键词: Information securityComputer scienceField (computer science)Intrusion prevention systemIntrusion detection systemTaxonomy (general)Intrusion responseIntrusion response systemsAnomaly-based intrusion detection systemComputer security

摘要: Recent advances in the field of intrusion detection brought new requirements to prevention and response. Traditionally, response an attack is manually triggered by administrator. However, increased complexity speed attack-spread during recent years show acute necessity for complex dynamic mechanisms. Although systems are being actively developed, research efforts still isolated. In this work we present a taxonomy systems, together with review current trends research. We also provide set essential features as requirement ideal system.

参考文章(26)
Douglas S. Reeves, Xinyuan Wang, S. Felix Wu, Tracing Based Active Intrusion Response ,(2002)
Peyman Kabiri, Ali A. Ghorbani, RESEARCH ON INTRUSION DETECTION AND RESPONSE: A SURVEY International Journal of Network Security. ,vol. 1, pp. 84- 102 ,(2005) , 10.6633/IJNS.200509.1(2).05
Michael E. Locasto, Angelos D. Keromytis, Stelios Sidiroglou, Stephen W. Boyd, Building a reactive immune system for software services usenix annual technical conference. pp. 11- 11 ,(2005) , 10.7916/D86D6562
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
Thomas R. Peltier, Information Security Risk Analysis ,(2001)
D. Schnackenberg, K. Djahandari, D. Sterne, Infrastructure for intrusion detection and response darpa information survivability conference and exposition. ,vol. 2, pp. 3- 11 ,(2000) , 10.1109/DISCEX.2000.821505
Ivan Balepin, Sergei Maltsev, Jeff Rowe, Karl Levitt, Using specification-based intrusion detection for Automated response recent advances in intrusion detection. pp. 136- 154 ,(2003) , 10.1007/978-3-540-45248-5_8
Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, Jim Yuill, Sleepy watermark tracing: an active network-based intrusion response framework information security. pp. 369- 384 ,(2001) , 10.1007/0-306-46998-7_26