A Response Strategy Model for Intrusion Response Systems

作者: Nor Badrul Anuar , Maria Papadaki , Steven Furnell , Nathan Clarke

DOI: 10.1007/978-3-642-30436-1_51

关键词:

摘要: There are several types of security systems, which focus on detecting, mitigating and responding to incidents. Current response systems largely based manual incident selection strategies, can introduce delays between detection time. However, it would be beneficial if critical urgent incidents addressed as soon possible before they jeopardised systems. As a result, the Risk Index Model (RIM) has been proposed earlier in our previous study, method prioritising upon two decision factors namely impact assets likelihood threat vulnerability. This paper extends RIM by using basis for mapping with various options. The model, Response Strategy (RSM) is risk planning time management concepts evaluated DARPA 2000 dataset. case study analysis dataset shown significant result into different quadrants. In particular, results have relationship classification priorities where false likely categorised low priority true high incident.

参考文章(9)
Udo W. Pooch, Curtis A. Carver, Adaptive agent-based intrusion response Texas A&M University. ,(2001)
Steven Furnell, Nathan Clarke, Nor Badrul Anuar, Maria Papadakil, A Risk Index Model for Security Incident Prioritisation ,(2011) , 10.4225/75/57B52A66CD8B5
M. Papadaki, S.M. Furnell, Informing the decision process in an automated intrusion response system Information Security Technical Report. ,vol. 10, pp. 150- 161 ,(2005) , 10.1016/J.ISTR.2005.07.002
Chengpo Mu, Yingjiu Li, An intrusion response decision-making model based on hierarchical task network planning Expert Systems With Applications. ,vol. 37, pp. 2465- 2472 ,(2010) , 10.1016/J.ESWA.2009.07.079
Nor Badrul Anuar, Maria Papadaki, Steve Furnell, Nathan Clarke, An investigation and survey of response options for Intrusion Response Systems (IRSs) information security for south africa. pp. 1- 8 ,(2010) , 10.1109/ISSA.2010.5588654
Fred Cohen, Simulating cyber attacks, defences, and consequences Computers & Security. ,vol. 18, pp. 479- 518 ,(1999) , 10.1016/S0167-4048(99)80115-1
Peter Mell, Karen Scarfone, Sasha Romanosky, Common Vulnerability Scoring System ieee symposium on security and privacy. ,vol. 4, pp. 85- 89 ,(2006) , 10.1109/MSP.2006.145
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, S. Bagchi, E. Spafford, ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment dependable systems and networks. pp. 508- 517 ,(2005) , 10.1109/DSN.2005.17
Natalia Stakhanova, Samik Basu, Johnny Wong, A Cost-Sensitive Model for Preemptive Intrusion Response Systems advanced information networking and applications. pp. 428- 435 ,(2007) , 10.1109/AINA.2007.9