메뉴 건너뛰기




Volumn 45, Issue 8, 2008, Pages 1290-1298

Survey of intrusion response decision-making techniques of automated intrusion response systems

Author keywords

Alert processing; Automated intrusion response system; Intrusion detection; Intrusion response decision making; Network security

Indexed keywords


EID: 54749113385     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (24)
  • 1
    • 35048866691 scopus 로고    scopus 로고
    • Support for automated passive host-based intrusion response
    • Durham, NC, USA: Department of Computer Science, Duke University
    • Ashish Gehani. Support for automated passive host-based intrusion response[D]. Durham, NC, USA: Department of Computer Science, Duke University, 2003
    • (2003)
    • Gehani, A.1
  • 2
    • 4444308274 scopus 로고    scopus 로고
    • Adaptive-based intrusion response
    • College Station: Texas A&M University
    • Curtis A Carver. Adaptive-based intrusion response[D]. College Station: Texas A&M University, 2001
    • (2001)
    • Carver, C.A.1
  • 4
    • 27544503196 scopus 로고    scopus 로고
    • ADEPTS: Adaptive intrusion response using attack graphs in an E-commerce environment
    • Piscataway, NJ: IEEE Computer Society
    • Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, et al. ADEPTS: Adaptive intrusion response using attack graphs in an E-commerce environment[C]//Proc of the DSN-DCC Symposium 2005. Piscataway, NJ: IEEE Computer Society, 2005
    • (2005) Proc of the DSN-DCC Symposium 2005
    • Foo, B.1    Wu, Y.-S.2    Mao, Y.-C.3
  • 6
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Gaithersburg, USA: Information Technology Laboratory
    • Porras P A, Neumann P G. EMERALD: Event monitoring enabling responses to anomalous live disturbances[C]//Proc of the 20th National Information Systems Security Conference. Gaithersburg, USA: Information Technology Laboratory, 1997
    • (1997) Proc of the 20th National Information Systems Security Conference
    • Porras, P.A.1    Neumann, P.G.2
  • 7
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • White G B, Fisch E A, Pooch U W. Cooperating security managers: A peer-based intrusion detection system[J]. IEEE Network, 1996, 10(1): 20-23
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3
  • 8
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Wenke Lee. Toward cost-sensitive modeling for intrusion detection and response[J]. Journal of Computer Security, 2002, 10(2): 5-22
    • (2002) Journal of Computer Security , vol.10 , Issue.2 , pp. 5-22
    • Lee, W.1
  • 9
    • 84948979531 scopus 로고    scopus 로고
    • Evaluating the impact of automated intrusion response mechanisms
    • Washington, DC: IEEE Computer Society
    • Thomas Toth, Christopher Kruegel. Evaluating the impact of automated intrusion response mechanisms[C]//Proc of the 18th Annual Computer Security Application Conference. Washington, DC: IEEE Computer Society, 2002
    • (2002) Proc of the 18th Annual Computer Security Application Conference
    • Toth, T.1    Kruegel, C.2
  • 10
    • 84927699138 scopus 로고    scopus 로고
    • ADEPTS: Adaptive intrusion containment and response using attack graphs in an E-commerce environment, 2003-33
    • West Lafayette, Indiana, USA: Purdue University
    • Yu-Sung Wu, Bingrui Foo, Blake Matheny, et al. ADEPTS: Adaptive intrusion containment and response using attack graphs in an E-commerce environment, 2003-33[R]. West Lafayette, Indiana, USA: Purdue University, 2003
    • (2003)
    • Wu, Y.-S.1    Foo, B.2    Matheny, B.3
  • 13
    • 85084164032 scopus 로고    scopus 로고
    • Automated response using system-call delay
    • Berkeley, CA, USA: The Advanced Computing Systems Association
    • Somayaji A, Forrest S. Automated response using system-call delay[C]//Proc of the 9th USENIX Security Symposium. Berkeley, CA, USA: The Advanced Computing Systems Association, 2000
    • (2000) Proc of the 9th USENIX Security Symposium
    • Somayaji, A.1    Forrest, S.2
  • 16
    • 54749110223 scopus 로고    scopus 로고
    • Design of an intrusion response system using evolutionary computation, CS401
    • Miner Circle Rolla, Missouri, USA: Computer Science Department, University of Missouri-Rolla
    • Rohit Parti. Design of an intrusion response system using evolutionary computation, CS401[R]. Miner Circle Rolla, Missouri, USA: Computer Science Department, University of Missouri-Rolla, 2003
    • (2003)
    • Parti, R.1
  • 17
    • 35048841338 scopus 로고    scopus 로고
    • Adaptive intrusion response to minimize risk over multiple network attacks
    • Sapon Tanachaiwiwat, Kai Hwang, Yue Chen. Adaptive intrusion response to minimize risk over multiple network attacks[OL]. [2002-08-27]. http://ceng.use.edu/-kaihwang/papers/ACM827.pdf
    • (2002)
    • Tanachaiwiwat, S.1    Hwang, K.2    Chen, Y.3
  • 19
    • 21944457574 scopus 로고    scopus 로고
    • A comprehensive approach to intrusion detection alert correlation
    • Fredrik Valeur, Giovanni Vigna, Christopher Kruegel, et al. A comprehensive approach to intrusion detection alert correlation[J]. IEEE Trans on Dependable and Secure Computing, 2004, 1(3): 146-169
    • (2004) IEEE Trans on Dependable and Secure Computing , vol.1 , Issue.3 , pp. 146-169
    • Valeur, F.1    Vigna, G.2    Kruegel, C.3
  • 20
    • 33645455033 scopus 로고    scopus 로고
    • A survey of intrusion-detection alert aggregation and correlation techniques
    • in Chinese
    • Mu Chengpo, Huang Houkuan, Tian Shengfeng. A survey of intrusion-detection alert aggregation and correlation techniques[J]. Journal of Computer Research and Development, 2006, 43(1): 1-8 (in Chinese)
    • (2006) Journal of Computer Research and Development , vol.43 , Issue.1 , pp. 1-8
    • Mu, C.1    Huang, H.2    Tian, S.3
  • 21
    • 44649202877 scopus 로고    scopus 로고
    • A taxonomy of intrusion response systems, 06-05
    • Ames, Iowa, USA: Department of Computer Science, Iowa State University
    • Natalia Stakhanova, Samik Basu, Johnny Wong. A taxonomy of intrusion response systems, 06-05[R]. Ames, Iowa, USA: Department of Computer Science, Iowa State University, 2006
    • (2006)
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 23
    • 54749089198 scopus 로고    scopus 로고
    • Research on automated intrusion response system
    • Beijing: Beijing Jiaotong University, in Chinese
    • Mu Chengpo. Research on automated intrusion response system[D]. Beijing: Beijing Jiaotong University, 2006 (in Chinese)
    • (2006)
    • Mu, C.1
  • 24
    • 3442892183 scopus 로고    scopus 로고
    • Rollbackable automated intrusion response system
    • in Chinese
    • Zhang Jian, Pang Jian. Rollbackable automated intrusion response system[J]. Acta Electronica Sinica, 2004, 32(5): 769-773 (in Chinese)
    • (2004) Acta Electronica Sinica , vol.32 , Issue.5 , pp. 769-773
    • Zhang, J.1    Pang, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.