A Response Strategy Model for Intrusion Response Systems

被引:0
|
作者
Anuar, Nor Badrul [1 ,2 ]
Papadaki, Maria [1 ]
Furnell, Steven [1 ,3 ]
Clarke, Nathan [1 ,3 ]
机构
[1] Univ Plymouth, Ctr Secur Commun & Network Res CSCAN, Plymouth PL4 8AA, Devon, England
[2] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[3] Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA, Australia
关键词
intrusion response systems; risk response planning; response strategy model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are several types of security systems, which focus on detecting, mitigating and responding to incidents. Current response systems are largely based on manual incident response selection strategies, which can introduce delays between detection and response time. However, it would be beneficial if critical and urgent incidents are addressed as soon as possible before they jeopardised critical systems. As a result, the Risk Index Model (RIM) has been proposed earlier in our previous study, as a method of prioritising incidents based upon two decision factors namely impact on assets and likelihood of threat and vulnerability. This paper extends RIM by using it as the basis for mapping incidents with various response options. The proposed mapping model, Response Strategy Model (RSM) is based on risk response planning and time management concepts and it is evaluated using the DARPA 2000 dataset. The case study analysis upon the dataset has shown a significant result in mapping incident into different quadrants. In particular, the results have shown a significant relationship between the incident classification with incident priorities where false incidents are likely to be categorised as low priority incidents and true incidents are likely to be categorised as the high priority incident.
引用
收藏
页码:573 / 578
页数:6
相关论文
共 50 条
  • [1] A response selection model for intrusion response systems: Response Strategy Model (RSM)
    Anuar, Nor Badrul
    Papadaki, Maria
    Furnell, Steven
    Clarke, Nathan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1831 - 1848
  • [2] An Optimal Metric-Aware Response Selection Strategy for Intrusion Response Systems
    Herold, Nadine
    Wachs, Matthias
    Posselt, Stephan-A
    Carle, Georg
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 68 - 84
  • [3] A Model-Free Approach to Intrusion Response Systems
    Hughes, Kieran
    McLaughlin, Kieran
    Sezer, Sakir
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [4] Towards a model for effective response determination in intrusion detection systems
    Yang, DH
    Frincke, DA
    CCCT 2003, VOL 3, PROCEEDINGS, 2003, : 122 - 126
  • [5] Cost-sensitive model for preemptive intrusion response systems
    Stakhanova, Natalia
    Basu, Samik
    Wong, Johnny
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, : 428 - +
  • [6] A fictitious play-based response strategy for multistage intrusion defense systems
    Luo, Yi
    Szidarovszky, Ferenc
    Al-Nashif, Youssif
    Hariri, Salim
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 473 - 491
  • [7] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [8] Survey of intrusion response decision-making techniques of automated intrusion response systems
    Mu, Chengpo
    Huang, Houkuan
    Tian, Shengfeng
    Li, Xiangjun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (08): : 1290 - 1298
  • [9] Intrusion Response Systems: Survey and Taxonomy
    Shameli-Sendi, Alireza
    Ezzati-jivan, Naser
    Jabbarifar, Masoume
    Dagenais, Michel
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (01): : 1 - 14
  • [10] Towards Autonomic Intrusion Response Systems
    Iannucci, Stefano
    Abdelwahed, Sherif
    2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, : 229 - 230