메뉴 건너뛰기




Volumn 62, Issue , 2016, Pages 53-74

Intrusion response systems: Foundations, design, and challenges

Author keywords

Intrusion detection; Intrusion response; Response design parameter; Semantic coherence

Indexed keywords

COMPUTER CRIME; DESIGN; MERCURY (METAL); SEMANTICS;

EID: 84954503459     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2015.12.006     Document Type: Review
Times cited : (96)

References (112)
  • 2
    • 85132890376 scopus 로고    scopus 로고
    • A survey on intrusion detection in mobile ad hoc networks
    • Springer
    • T. Anantvalee, and J. Wu A survey on intrusion detection in mobile ad hoc networks Wireless Network Security 2007 Springer 159 180
    • (2007) Wireless Network Security , pp. 159-180
    • Anantvalee, T.1    Wu, J.2
  • 3
    • 78149489905 scopus 로고    scopus 로고
    • An investigation and survey of response options for Intrusion Response Systems (IRSs)
    • N.B. Anuar, M. Papadaki, S. Furnell, and N. Clarke An investigation and survey of response options for Intrusion Response Systems (IRSs) Inf Secur South Afr 2010 1 8
    • (2010) Inf Secur South Afr , pp. 1-8
    • Anuar, N.B.1    Papadaki, M.2    Furnell, S.3    Clarke, N.4
  • 4
    • 70449353683 scopus 로고    scopus 로고
    • Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
    • N.B. Anuar, H. Sallehudin, A. Gani, and O. Zakari Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree Malays J Comput Sci 21 2008 101 115
    • (2008) Malays J Comput Sci , vol.21 , pp. 101-115
    • Anuar, N.B.1    Sallehudin, H.2    Gani, A.3    Zakari, O.4
  • 8
    • 84920181628 scopus 로고    scopus 로고
    • Autonomic schemes for threat mitigation in Internet of Things
    • Q.M. Ashraf, and M.H. Habaebi Autonomic schemes for threat mitigation in Internet of Things J Netw Comput Appl 49 2015 112 127
    • (2015) J Netw Comput Appl , vol.49 , pp. 112-127
    • Ashraf, Q.M.1    Habaebi, M.H.2
  • 9
    • 48749093494 scopus 로고    scopus 로고
    • A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification
    • A. Asosheh, and N. Ramezani A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification WSEAS Trans Comput 7 2008 281 290
    • (2008) WSEAS Trans Comput , vol.7 , pp. 281-290
    • Asosheh, A.1    Ramezani, N.2
  • 11
    • 0003907293 scopus 로고    scopus 로고
    • Book ISBN:1-57870-185-6
    • Bace RG. Intrusion detection, (http://dl.acm.org/citation.cfm?id=347487), Book; 2002. ISBN:1-57870-185-6.
    • (2002) Intrusion Detection
    • Bace, R.G.1
  • 13
    • 84954524186 scopus 로고    scopus 로고
    • An adaptive intrusion detection system using neural networks
    • Bonifaco J, Moreira E. An adaptive intrusion detection system using neural networks. In: Proceedings of the IFIP SEC; 1997.
    • (1997) Proceedings of the IFIP SEC
    • Bonifaco, J.1    Moreira, E.2
  • 14
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor networks
    • I. Butun, S.D. Morgera, and R. Sankar A survey of intrusion detection systems in wireless sensor networks Commun Surv Tutorials IEEE 16 2014 266 282
    • (2014) Commun Surv Tutorials IEEE , vol.16 , pp. 266-282
    • Butun, I.1    Morgera, S.D.2    Sankar, R.3
  • 18
    • 84954506028 scopus 로고    scopus 로고
    • Cert. CERT statistics [Accessed on October 2014]
    • Cert. CERT statistics, http://www.cert.org/stats; 2014 [Accessed on October 2014].
    • (2014)
  • 20
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • K.-K.R. Choo The cyber threat landscape: challenges and future research directions Comput Secur 30 2011 719 731
    • (2011) Comput Secur , vol.30 , pp. 719-731
    • Choo, K.-K.R.1
  • 21
    • 84954471157 scopus 로고    scopus 로고
    • Cisco. [Accessed on October, 2014]
    • Cisco. (http://www.cisco.com/cisco/web/solutions/small-business/resource-center/articles/secure-my-business/what-is
    • (2014)
  • 24
    • 84954513460 scopus 로고    scopus 로고
    • [Accessed on August 2014]
    • Deris Stiawan MYI, Abdul Hanan Abdullah, (http://eprints.unsri.ac.id/73/1/2011-7-12-4212-4224.pdf); 2011 [Accessed on August 2014].
    • (2011)
    • Stiawan MYI, D.1    Hanan Abdullah, A.2
  • 27
    • 59549096053 scopus 로고    scopus 로고
    • Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation
    • L. Feng, W. Wang, L. Zhu, and Y. Zhang Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation J Netw Comput Appl 32 2009 721 732
    • (2009) J Netw Comput Appl , vol.32 , pp. 721-732
    • Feng, L.1    Wang, W.2    Zhu, L.3    Zhang, Y.4
  • 29
    • 0003541908 scopus 로고    scopus 로고
    • Architecture design of a scalable intrusion detection system for the emerging network infrastructure
    • Releigh (NC, USA): Department of Computer Science, North Carolina State University Releigh
    • Frank Y, Jou FG, Chandru Sargor, Shyhtsun Felix Wu, Cleaveland W Rance. Architecture design of a scalable intrusion detection system for the emerging network infrastructure. Technical Report CDRL A005. Releigh (NC, USA): Department of Computer Science, North Carolina State University Releigh; 1997.
    • (1997) Technical Report CDRL A005
    • Frank, Y.1    Jou, F.G.2    Sargor, C.3    Felix Wu, S.4    Rance, C.W.5
  • 32
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • S. Hansman, and R. Hunt A taxonomy of network and computer attacks Comput Secur 24 2005 31 43
    • (2005) Comput Secur , vol.24 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 34
    • 78650135042 scopus 로고    scopus 로고
    • MOVIH-IDS: A mobile-visualization hybrid intrusion detection system
    • Á. Herrero, E. Corchado, M.A. Pellicer, and A. Abraham MOVIH-IDS: a mobile-visualization hybrid intrusion detection system Neurocomputing 72 2009 2775 2784
    • (2009) Neurocomputing , vol.72 , pp. 2775-2784
    • Herrero, Á.1    Corchado, E.2    Pellicer, M.A.3    Abraham, A.4
  • 35
    • 84863242123 scopus 로고    scopus 로고
    • Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
    • C.-Y. Ho, Y.-C. Lai, I.-W. Chen, F.-Y. Wang, and W.-H. Tai Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems IEEE Commun Mag 50 2012 146 154
    • (2012) IEEE Commun Mag , vol.50 , pp. 146-154
    • Ho, C.-Y.1    Lai, Y.-C.2    Chen, I.-W.3    Wang, F.-Y.4    Tai, W.-H.5
  • 37
    • 0033293621 scopus 로고    scopus 로고
    • A large scale distributed intrusion detection framework based on attack strategy analysis
    • M.-Y. Huang, R.J. Jasper, and T.M. Wicks A large scale distributed intrusion detection framework based on attack strategy analysis Comput Netw 31 1999 2465 2475
    • (1999) Comput Netw , vol.31 , pp. 2465-2475
    • Huang, M.-Y.1    Jasper, R.J.2    Wicks, T.M.3
  • 38
    • 84903312615 scopus 로고    scopus 로고
    • False alarm minimization techniques in signature-based intrusion detection systems: A survey
    • 13:128
    • N. Hubballi, and Vinoth Suryanarayanan False alarm minimization techniques in signature-based intrusion detection systems: a survey Comput Commun 49 2014 1 17 13:128
    • (2014) Comput Commun , vol.49 , pp. 1-17
    • Hubballi, N.1    Suryanarayanan, V.2
  • 43
    • 84923382316 scopus 로고    scopus 로고
    • An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking
    • A. Karami, and M. Guerrero-Zapata An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking Comput Netw 80 2015 51 65
    • (2015) Comput Netw , vol.80 , pp. 51-65
    • Karami, A.1    Guerrero-Zapata, M.2
  • 44
    • 84912115872 scopus 로고    scopus 로고
    • A fuzzy anomaly detection system based on hybrid pso-kmeans algorithm in content-centric networks
    • A. Karami, and M. Guerrero-Zapata A fuzzy anomaly detection system based on hybrid pso-kmeans algorithm in content-centric networks Neurocomputing 149 2015 1253 1269
    • (2015) Neurocomputing , vol.149 , pp. 1253-1269
    • Karami, A.1    Guerrero-Zapata, M.2
  • 45
    • 84918495473 scopus 로고    scopus 로고
    • A hybrid multiobjective rbf-pso method for mitigating dos attacks in named data networking
    • A. Karami, and M. Guerrero-Zapata A hybrid multiobjective rbf-pso method for mitigating dos attacks in named data networking Neurocomputing 151 2015 1262 1282
    • (2015) Neurocomputing , vol.151 , pp. 1262-1282
    • Karami, A.1    Guerrero-Zapata, M.2
  • 47
    • 84904646449 scopus 로고    scopus 로고
    • A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
    • S. Khan, M. Shiraz, A.W. Abdul Wahab, A. Gani, Q. Han, and Z. Bin Abdul Rahman A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing Sci World J 2014 2014
    • (2014) Sci World J , pp. 2014
    • Khan, S.1    Shiraz, M.2    Abdul Wahab, A.W.3    Gani, A.4    Han, Q.5    Bin Abdul Rahman, Z.6
  • 56
    • 84954509596 scopus 로고    scopus 로고
    • Laboratory L. [Accessed on October 2014]
    • Laboratory L. (http://www.ll.mit.edu/ideval/data/); 2000 [Accessed on October 2014].
    • (2000)
  • 59
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • W. Lee, W. Fan, M. Miller, S.J. Stolfo, and E. Zadok Toward cost-sensitive modeling for intrusion detection and response J Comput Secur 10 2002 5 22
    • (2002) J Comput Secur , vol.10 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.J.4    Zadok, E.5
  • 60
    • 81355154787 scopus 로고    scopus 로고
    • An ontology-based intrusion alerts correlation system
    • W. Li, and S. Tian An ontology-based intrusion alerts correlation system Expert Syst Appl 37 2010 7138 7146
    • (2010) Expert Syst Appl , vol.37 , pp. 7138-7146
    • Li, W.1    Tian, S.2
  • 64
    • 84866351667 scopus 로고    scopus 로고
    • Definition of response metrics for an ontology-based Automated Intrusion Response Systems
    • V. Mateos, V.A. Villagrá, F. Romero, and J. Berrocal Definition of response metrics for an ontology-based Automated Intrusion Response Systems Comput Electr Eng 38 2012 1102 1114
    • (2012) Comput Electr Eng , vol.38 , pp. 1102-1114
    • Mateos, V.1    Villagrá, V.A.2    Romero, F.3    Berrocal, J.4
  • 65
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • R. Mitchell, and I.-R. Chen A survey of intrusion detection techniques for cyber-physical systems ACM Comput Surv (CSUR) 46 2014 55
    • (2014) ACM Comput Surv (CSUR) , vol.46 , pp. 55
    • Mitchell, R.1    Chen, I.-R.2
  • 66
    • 84874959990 scopus 로고    scopus 로고
    • Effect of intrusion detection and response on reliability of cyber physical systems
    • R. Mitchell, and I. Chen Effect of intrusion detection and response on reliability of cyber physical systems Reliab IEEE Trans 62 2013 199 210
    • (2013) Reliab IEEE Trans , vol.62 , pp. 199-210
    • Mitchell, R.1    Chen, I.2
  • 67
    • 57049181381 scopus 로고    scopus 로고
    • Online risk assessment of intrusion scenarios using DS evidence theory
    • Springer
    • C. Mu, X. Li, H. Huang, and S. Tian Online risk assessment of intrusion scenarios using DS evidence theory Computer Security-ESORICS 2008 2008 Springer 35 48
    • (2008) Computer Security-ESORICS 2008 , pp. 35-48
    • Mu, C.1    Li, X.2    Huang, H.3    Tian, S.4
  • 68
    • 70449517238 scopus 로고    scopus 로고
    • An intrusion response decision-making model based on hierarchical task network planning
    • C. Mu, and Y. Li An intrusion response decision-making model based on hierarchical task network planning Expert Syst Appl 37 2010 2465 2472
    • (2010) Expert Syst Appl , vol.37 , pp. 2465-2472
    • Mu, C.1    Li, Y.2
  • 69
    • 84954555878 scopus 로고    scopus 로고
    • MyCert-Report MyCERT "Malaysian Computer Emergency response Team Incident Statistics« [Accessed on October 2014]
    • MyCert-Report. MyCERT "Malaysian Computer Emergency response Team Incident Statistics«, Available on: (http://www.mycert.org.my/en/services/statistic/mycert/2013/main/detail/914/index.html); 2014 [Accessed on October 2014].
    • (2014)
  • 71
    • 84879894593 scopus 로고    scopus 로고
    • Protection of MANETs from a range of attacks using an intrusion detection and prevention system
    • A. Nadeem, and M. Howarth Protection of MANETs from a range of attacks using an intrusion detection and prevention system Telecommun Syst 52 2013 2047 2058
    • (2013) Telecommun Syst , vol.52 , pp. 2047-2058
    • Nadeem, A.1    Howarth, M.2
  • 72
    • 84888646473 scopus 로고    scopus 로고
    • An intrusion detection & adaptive response mechanism for MANETs
    • A. Nadeem, and M.P. Howarth An intrusion detection & adaptive response mechanism for MANETs Ad Hoc Netw 13 2014 368 380
    • (2014) Ad Hoc Netw , vol.13 , pp. 368-380
    • Nadeem, A.1    Howarth, M.P.2
  • 74
    • 84893764188 scopus 로고    scopus 로고
    • The Internet of Things: Do more devices mean more risks?
    • M. O×Neill The Internet of Things: do more devices mean more risks? Comput Fraud Secur 2014 16 17
    • (2014) Comput Fraud Secur , pp. 16-17
    • Oneill, M.1
  • 76
    • 33744811458 scopus 로고    scopus 로고
    • Achieving automated intrusion response: A prototype implementation
    • M. Papadaki, and S. Furnell Achieving automated intrusion response: a prototype implementation Inf Manag Comput Secur 14 2006 235 251
    • (2006) Inf Manag Comput Secur , vol.14 , pp. 235-251
    • Papadaki, M.1    Furnell, S.2
  • 77
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: A systematic review
    • A. Patel, M. Taghavi, K. Bakhtiyari, and J.C. Júnior An intrusion detection and prevention system in cloud computing: a systematic review J Netw Comput Appl 36 2013 25 41
    • (2013) J Netw Comput Appl , vol.36 , pp. 25-41
    • Patel, A.1    Taghavi, M.2    Bakhtiyari, K.3    Júnior, J.C.4
  • 78
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson Bro: a system for detecting network intruders in real-time Comput Netw 31 1999 2435 2463
    • (1999) Comput Netw , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 81
    • 84927804589 scopus 로고    scopus 로고
    • Sierpinski triangle based data center architecture in cloud computing
    • H. Qi, M. Shiraz, A. Gani, M. Whaiduzzaman, and S. Khan Sierpinski triangle based data center architecture in cloud computing J Supercomput 2014 1 21
    • (2014) J Supercomput , pp. 1-21
    • Qi, H.1    Shiraz, M.2    Gani, A.3    Whaiduzzaman, M.4    Khan, S.5
  • 83
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • M. Roesch Snort: lightweight intrusion detection for networks LISA 1999 229 238
    • (1999) LISA , pp. 229-238
    • Roesch, M.1
  • 84
    • 84954491527 scopus 로고    scopus 로고
    • Room SIIR. [Accessed on 27th May 2014]
    • Room SIIR. (http://www.sans.org/reading-room/whitepapers/malicious/code-red-worm-45); 2001 [Accessed on 27th May 2014].
    • (2001)
  • 87
    • 33645141316 scopus 로고    scopus 로고
    • Intrusion prevention systems: Security×s silver bullet?
    • SANS Institute, and S. Dinesh Intrusion prevention systems: security×s silver bullet? Bus Commun Rev 33 2003 36 41
    • (2003) Bus Commun Rev , vol.33 , pp. 36-41
    • Institute, S.1    Dinesh, S.2
  • 88
    • 58149104386 scopus 로고    scopus 로고
    • Guide to intrusion detection and prevention systems (IDPS)
    • K. Scarfone, and P. Mell Guide to intrusion detection and prevention systems (IDPS) NIST Spec Publ 800 2007 94
    • (2007) NIST Spec Publ , vol.800 , pp. 94
    • Scarfone, K.1    Mell, P.2
  • 89
    • 42449117164 scopus 로고    scopus 로고
    • Guide to intrusion detection and prevention systems (IDPS), Sp-800-94
    • National Institute of Science and Technology National Institute of Science and Technology Gaithersburg
    • K. Scarfone, and P. Mell Guide to intrusion detection and prevention systems (IDPS), Sp-800-94 Special Publication NIST 2007 National Institute of Science and Technology National Institute of Science and Technology Gaithersburg
    • (2007) Special Publication NIST
    • Scarfone, K.1    Mell, P.2
  • 91
    • 84901267947 scopus 로고    scopus 로고
    • Taxonomy of intrusion risk assessment and response system
    • A. Shameli-Sendi, M. Cheriet, and A. Hamou-Lhadj Taxonomy of intrusion risk assessment and response system Comput Secur 45 2014 1 16
    • (2014) Comput Secur , vol.45 , pp. 1-16
    • Shameli-Sendi, A.1    Cheriet, M.2    Hamou-Lhadj, A.3
  • 92
    • 84930617387 scopus 로고    scopus 로고
    • ORCEF: Online response cost evaluation framework for intrusion response system
    • A. Shameli-Sendi, and M. Dagenais ORCEF: online response cost evaluation framework for intrusion response system J Netw Comput Appl 2015
    • (2015) J Netw Comput Appl
    • Shameli-Sendi, A.1    Dagenais, M.2
  • 97
    • 34548775838 scopus 로고    scopus 로고
    • A cost-sensitive model for preemptive intrusion response systems
    • N. Stakhanova, S. Basu, and J. Wong A cost-sensitive model for preemptive intrusion response systems AINA 2007 428 435
    • (2007) AINA , pp. 428-435
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 101
    • 70449465787 scopus 로고    scopus 로고
    • Adaptive intrusion response to minimize risk over multiple network attacks
    • S. Tanachaiwiwat, K. Hwang, and Y. Chen Adaptive intrusion response to minimize risk over multiple network attacks ACM Trans Inf Syst Secur 19 2002 1 30
    • (2002) ACM Trans Inf Syst Secur , vol.19 , pp. 1-30
    • Tanachaiwiwat, S.1    Hwang, K.2    Chen, Y.3
  • 102
    • 84954570526 scopus 로고    scopus 로고
    • Technology T-N. [Accessed on 27.05.14]
    • Technology T-N. (http://teleco-network.blogspot.com/search?q=firewall); 2011 [Accessed on 27.05.14].
    • (2011)
  • 104
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna, and R.A. Kemmerer NetSTAT: a network-based intrusion detection system J Comput Secur 7 1999 37 71
    • (1999) J Comput Secur , vol.7 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.A.2
  • 105
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • Garak Vigna Intrusion detection: a brief history and overview Computer 35 4 2002 0027 0030
    • (2002) Computer , vol.35 , Issue.4 , pp. 0027-0030
    • Vigna, G.1
  • 106
    • 33747198726 scopus 로고    scopus 로고
    • Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
    • L. Wang, A. Liu, and S. Jajodia Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts Comput Commun 29 2006 2917 2933
    • (2006) Comput Commun , vol.29 , pp. 2917-2933
    • Wang, L.1    Liu, A.2    Jajodia, S.3
  • 108
    • 84904261405 scopus 로고    scopus 로고
    • Sleepy watermark tracing: An active network-based intrusion response framework
    • Springer
    • X. Wang, D.S. Reeves, S.F. Wu, and J. Yuill Sleepy watermark tracing: an active network-based intrusion response framework Trusted information 2001 Springer 369 384
    • (2001) Trusted Information , pp. 369-384
    • Wang, X.1    Reeves, D.S.2    Wu, S.F.3    Yuill, J.4
  • 109
    • 0029756282 scopus 로고    scopus 로고
    • Cooperating security managers: A peer-based intrusion detection system
    • G.B. White, E.A. Fisch, and U.W. Pooch Cooperating security managers: a peer-based intrusion detection system IEEE Netw 10 1996 20 23
    • (1996) IEEE Netw , vol.10 , pp. 20-23
    • White, G.B.1    Fisch, E.A.2    Pooch, U.W.3
  • 110
    • 33846201259 scopus 로고    scopus 로고
    • Automated adaptive intrusion containment in systems of interacting services
    • Y.-S. Wu, B. Foo, Y.-C. Mao, S. Bagchi, and E.H. Spafford Automated adaptive intrusion containment in systems of interacting services Comput Netw 51 2007 1334 1360
    • (2007) Comput Netw , vol.51 , pp. 1334-1360
    • Wu, Y.-S.1    Foo, B.2    Mao, Y.-C.3    Bagchi, S.4    Spafford, E.H.5
  • 112
    • 80051791562 scopus 로고    scopus 로고
    • Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
    • Z. Zhang, F. Naït-Abdesselam, P.-H. Ho, and Y. Kadobayashi Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks Comput Secur 30 2011 525 537
    • (2011) Comput Secur , vol.30 , pp. 525-537
    • Zhang, Z.1    Naït-Abdesselam, F.2    Ho, P.-H.3    Kadobayashi, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.