메뉴 건너뛰기




Volumn 37, Issue 3, 2010, Pages 2465-2472

An intrusion response decision-making model based on hierarchical task network planning

Author keywords

Automated intrusion response system; Hierarchical task network planning; Intrusion detection; Intrusion response decision making

Indexed keywords

ALERT MANAGEMENT; AUTOMATED INTRUSION RESPONSE SYSTEM; DECISION MAKING MODELS; DECISION MAKING PROCESS; FALSE POSITIVE; HIERARCHICAL TASK NETWORK PLANNING; HIERARCHICAL TASK NETWORKS; INTRUSION RESPONSE; INTRUSION RESPONSE DECISION-MAKING; INTRUSION RESPONSE SYSTEM; NEGATIVE IMPACTS; RESPONSE MEASURES; RESPONSE TIME; SELF-ADAPTIVE; SUBTASKS;

EID: 70449517238     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2009.07.079     Document Type: Article
Times cited : (52)

References (15)
  • 2
    • 4444308274 scopus 로고    scopus 로고
    • PhD dissertation. College Station: Texas A&M University
    • Carver, C. A. (2001). Adaptive-based intrusion response, PhD dissertation. College Station: Texas A&M University.
    • (2001) Adaptive-based intrusion response
    • Carver, C.A.1
  • 5
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • Lee W. Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10 2 (2002) 5-22
    • (2002) Journal of Computer Security , vol.10 , Issue.2 , pp. 5-22
    • Lee, W.1
  • 6
    • 33646824906 scopus 로고    scopus 로고
    • Intrusion Detection Alert Verification based on Multi-level Fuzzy Comprehensive Evaluation
    • 2005 International conference on computational intelligence and security, Springer-Verlag, Berlin, Germany
    • Mu, C. P., Huang, H. K., & Tian, S. F. (2005). Intrusion Detection Alert Verification based on Multi-level Fuzzy Comprehensive Evaluation. In 2005 International conference on computational intelligence and security. LNAI 3801, Springer-Verlag, Berlin, Germany.
    • (2005) LNAI , vol.3801
    • Mu, C.P.1    Huang, H.K.2    Tian, S.F.3
  • 8
    • 57049143207 scopus 로고    scopus 로고
    • False positive alert, irrelevant alert and duplicate alert reduction based on a comprehensive approach
    • Journal of Dynamics of Continuous, Discrete and Impulsive System, Supplementary Issue
    • Mu, C. P., Huang, H. K., & Tian, S. F. (2006). False positive alert, irrelevant alert and duplicate alert reduction based on a comprehensive approach. Journal of Dynamics of Continuous, Discrete and Impulsive System, Series B, Supplementary Issue.
    • (2006) Series B
    • Mu, C.P.1    Huang, H.K.2    Tian, S.F.3
  • 9
    • 57049181381 scopus 로고    scopus 로고
    • Online risk assessment of intrusion scenarios using D-S evidence theory
    • Proceedings of 13th European symposium on research in computer securityα, Springer-Verlag, Berlin, Germany
    • Mu, C. P., Huang, H. K., & Tian, S. F. (2008). Online risk assessment of intrusion scenarios using D-S evidence theory. In Proceedings of 13th European symposium on research in computer securityα LNCS, Springer-Verlag, Berlin, Germany.
    • (2008) LNCS
    • Mu, C.P.1    Huang, H.K.2    Tian, S.F.3
  • 10
    • 70449535138 scopus 로고    scopus 로고
    • Porras, P. A., & Neumann, P.G. (1997). EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of 20th national information systems security conference (pp. 353-365), Baltimore, MD, October 7-10 [Information Technology Lab, Gaithersburg USA 7].
    • Porras, P. A., & Neumann, P.G. (1997). EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of 20th national information systems security conference (pp. 353-365), Baltimore, MD, October 7-10 [Information Technology Lab, Gaithersburg USA 7].
  • 12
    • 44649202877 scopus 로고    scopus 로고
    • A taxonomy of intrusion response systems
    • Technical Report 06-05, Ames, IA, USA: Department of Computer Science, Iowa State University
    • Stakhanova, N., Basu, S., & Wong, J. (2006). A taxonomy of intrusion response systems. Technical Report 06-05, Ames, IA, USA: Department of Computer Science, Iowa State University.
    • (2006)
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 15
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • White G.B., Fisch E.A., and Pooch U.W. Cooperating security managers: A peer-based intrusion detection system. IEEE Network 10 1 (1996) 20-23
    • (1996) IEEE Network , vol.10 , Issue.1 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.