Enabling automated threat response through the use of a dynamic security policy

作者: Hervé Debar , Yohann Thomas , Frédéric Cuppens , Nora Cuppens-Boulahia

DOI: 10.1007/S11416-007-0039-Z

关键词:

摘要: Abstract Information systems security issues are currently being addressed using different techniques, such as authentication, encryption and access control, through the definition of …

参考文章(24)
Oliver Dain, Robert K. Cunningham, Fusing A Heterogeneous Alert Stream Into Scenarios Applications of Data Mining in Computer Security. pp. 103- 122 ,(2002) , 10.1007/978-1-4615-0953-0_5
Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens, Using Contextual Security Policies for Threat Response Detection of Intrusions and Malware & Vulnerability Assessment. pp. 109- 128 ,(2006) , 10.1007/11790754_7
Frédéric Cuppens, Alexandre Miège, Administration Model for Or-BAC Lecture Notes in Computer Science. pp. 754- 768 ,(2003) , 10.1007/978-3-540-39962-9_76
F. Cuppens, T. Sans, S. Gombault, Selecting appropriate counter-measures in an intrusion detection framework ieee computer security foundations symposium. pp. 78- 87 ,(2004) , 10.1109/CSFW.2004.18
Benjamin Morin, Ludovic Mé, Hervé Debar, Mireille Ducassé, M2D2: a formal data model for IDS alert correlation recent advances in intrusion detection. pp. 115- 137 ,(2002) , 10.1007/3-540-36084-0_7
S. Floyd, Inappropriate TCP Resets Considered Harmful RFC. ,vol. 3360, pp. 1- 19 ,(2002)
Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman, Protection in operating systems Communications of The ACM. ,vol. 19, pp. 461- 471 ,(1976) , 10.1145/360303.360333
Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel, High Level Conflict Management Strategies in Advanced Access Control Models Electronic Notes in Theoretical Computer Science. ,vol. 186, pp. 3- 26 ,(2007) , 10.1016/J.ENTCS.2007.01.064
Michiharu Kudo, Satoshi Hada, XML document security based on provisional authorization computer and communications security. pp. 87- 96 ,(2000) , 10.1145/352600.352613
T. Toth, C. Kruegel, Evaluating the impact of automated intrusion response mechanisms 18th Annual Computer Security Applications Conference, 2002. Proceedings.. pp. 301- 310 ,(2002) , 10.1109/CSAC.2002.1176302