메뉴 건너뛰기




Volumn 7, Issue 11, 2014, Pages 1831-1848

A response selection model for intrusion response systems: Response Strategy Model (RSM)

Author keywords

Intrusion response systems; Response strategy model; Risk response planning

Indexed keywords

INFORMATION SYSTEMS;

EID: 84910663668     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.896     Document Type: Article
Times cited : (4)

References (38)
  • 1
    • 84910673471 scopus 로고    scopus 로고
    • National Vulnerability Database version 2.0, Available at (Accessed: 1 August 2012).
    • NIST. National Vulnerability Database version 2.0, 2012. Available at: http://nvd.nist.gov/ (Accessed: 1 August 2012).
    • (2012)
  • 2
    • 84910679750 scopus 로고    scopus 로고
    • Symantec Internet security threat report-trends for 2010, Available at: (Accessed: 16 July 2011).
    • Symantec. Symantec Internet security threat report-trends for 2010, 2011. Available at: http://www.symantec.com/business/threatreport/index.jsp (Accessed: 16 July 2011).
    • (2011)
  • 3
    • 70449353683 scopus 로고    scopus 로고
    • Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
    • Anuar NB, Sallehudin H, Gani A, Zakaria O. Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree. Malaysian Journal of Computer Science 2008; 21(2):101-115.
    • (2008) Malaysian Journal of Computer Science , vol.21 , Issue.2 , pp. 101-115
    • Anuar, N.B.1    Sallehudin, H.2    Gani, A.3    Zakaria, O.4
  • 4
    • 84867026580 scopus 로고    scopus 로고
    • Magic quadrant for security information and event management
    • Gartner RAS Core Research Note G00167782
    • Nicolett M, Kavanagh K. Magic quadrant for security information and event management, Gartner RAS Core Research Note G00167782, 2009.
    • (2009)
    • Nicolett, M.1    Kavanagh, K.2
  • 7
    • 84888388073 scopus 로고    scopus 로고
    • An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique
    • Shamshirband S, Anuar NB, Kiah MLM, Patel A. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Engineering Applications of Artificial Intelligence 2013; 26(9):2105-2127.
    • (2013) Engineering Applications of Artificial Intelligence , vol.26 , Issue.9 , pp. 2105-2127
    • Shamshirband, S.1    Anuar, N.B.2    Kiah, M.L.M.3    Patel, A.4
  • 9
    • 70449517238 scopus 로고    scopus 로고
    • An intrusion response decision-making model based on hierarchical task network planning
    • Mu C, Li Y. An intrusion response decision-making model based on hierarchical task network planning. Expert Systems with Applications 2010; 37(3):2465-2472.
    • (2010) Expert Systems with Applications , vol.37 , Issue.3 , pp. 2465-2472
    • Mu, C.1    Li, Y.2
  • 16
    • 27644574459 scopus 로고    scopus 로고
    • Informing the decision process in an automated intrusion response system
    • Papadaki M, Furnell SM. Informing the decision process in an automated intrusion response system, Information Security Technical Report 2005, Vol. 10 No. 3, pp. 150-161,
    • (2005) Information Security Technical , vol.10 , Issue.3 , pp. 150-161
    • Papadaki, M.1    Furnell, S.M.2
  • 18
    • 0033299558 scopus 로고    scopus 로고
    • Simulating cyber attacks, defences, and consequences
    • Cohen F. Simulating cyber attacks, defences, and consequences. Computers & Security 1999; 18(6):479-518.
    • (1999) Computers & Security , vol.18 , Issue.6 , pp. 479-518
    • Cohen, F.1
  • 20
    • 84880643302 scopus 로고    scopus 로고
    • Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
    • Anuar NB, Papadaki M, Furnell S, Clarke N. Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Security Communication Networks 2013; 6(9): 1087-1116.
    • (2013) Security Communication Networks , vol.6 , Issue.9 , pp. 1087-1116
    • Anuar, N.B.1    Papadaki, M.2    Furnell, S.3    Clarke, N.4
  • 23
    • 0034862244 scopus 로고    scopus 로고
    • Risk analysis, systems analysis, and covey's seven habits perspectives
    • Haimes YY. Risk analysis, systems analysis, and covey's seven habits perspectives. Risk Analysis 2001; 21(2):217-224.
    • (2001) Risk Analysis , vol.21 , Issue.2 , pp. 217-224
    • Haimes, Y.Y.1
  • 26
    • 0036532669 scopus 로고    scopus 로고
    • Extending the risk process to manage opportunities
    • Hillson D. Extending the risk process to manage opportunities. International Journal of Project Management 2002; 20(3):235-240.
    • (2002) International Journal of Project Management , vol.20 , Issue.3 , pp. 235-240
    • Hillson, D.1
  • 28
    • 0034818337 scopus 로고    scopus 로고
    • An integrated approach for risk response development in project planning
    • Ben-David I, Raz T. An integrated approach for risk response development in project planning. Journal of the Operational Research Society 2001; 52:14-25.
    • (2001) Journal of the Operational Research Society , vol.52 , pp. 14-25
    • Ben-David, I.1    Raz, T.2
  • 30
    • 84910600781 scopus 로고    scopus 로고
    • DARPA intrusion detection data sets, Available at: (Accessed: 1 July 2011).
    • DARPA. DARPA intrusion detection data sets, 2011. Available at: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html (Accessed: 1 July 2011).
    • (2011)
  • 32
    • 77955430292 scopus 로고    scopus 로고
    • A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
    • Tjhai GC, Furnell SM, Papadaki M, Clarke NL. A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Computers & Security 2010; 29(6):712-723.
    • (2010) Computers & Security , vol.29 , Issue.6 , pp. 712-723
    • Tjhai, G.C.1    Furnell, S.M.2    Papadaki, M.3    Clarke, N.L.4
  • 35
    • 84910664235 scopus 로고    scopus 로고
    • Available at: (Accessed: 1 March 2011).
    • GCIA. GIAC Certified Intrusion Analyst (GCIA), 2011. Available at: http://www.giac.org/certifications/security/gcia.php (Accessed: 1 March 2011).
    • (2011) GIAC Certified Intrusion Analyst (GCIA)
  • 38
    • 84863716009 scopus 로고    scopus 로고
    • FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems
    • Alsubhi K, Aib I, Boutaba R. FuzMet: a fuzzy-logic based alert prioritization engine for intrusion detection systems. International Journal of Network Management 2012; 22(4): 263-284.
    • (2012) International Journal of Network Management , vol.22 , Issue.4 , pp. 263-284
    • Alsubhi, K.1    Aib, I.2    Boutaba, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.