Taxonomy of intrusion risk assessment and response system
نویسندگان
چکیده
In recent years, we have seen notable changes in the way attackers infiltrate computer systems compromising their functionality. Research in intrusion detection systems aims to reduce the impact of these attacks. In this paper, we present a taxonomy of intrusion response systems (IRS) and Intrusion Risk Assessment (IRA), two important components of an intrusion detection solution. We achieve this by classifying a number of studies published during the last two decades . We discuss the key features of existing IRS and IRA. We show how characterizing security risks and choosing the right countermeasures are an important and challenging part of designing an IRS and an IRA. Poorly designed IRS and IRA may reduce network performance and wrongly disconnect users from a network. We propose techniques on how to address these challenges and highlight the need for a comprehensive defense mechanism approach. We believe that this taxonomy will open up interesting areas for future research in the growing field of intrusion risk assessment and response systems.
منابع مشابه
A Generic Taxonomy for Intrusion Specification and Response
The paper presents a preliminary description of an intrusion taxonomy to aid the development of a generic intrusion specification and response platform. Existing intrusion taxonomies are assessed in order to derive a suitable classification of incidents that would be both detectable and addressable by an automated intrusion detection system. The issue of automated responses to intrusions is con...
متن کاملAssessment of Saltwater Pollution in Azarshahr Plain Groundwater, Iran: Conjugating GALDIT Method and Geostatistics
Overutilization of groundwater resources can put their quality under stress. It could be base on rapid declination in groundwater level leading to salt water intrusion in the coastal aquifers. The objective of this study was to map the vulnerability of salt water intrusion of the Urmia Lake, Iran to nearby coastal aquifer (Azarshahr) using GALDIT method. The GALDIT index based on six parameters...
متن کاملA taxonomy of intrusion response systems
Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 45 شماره
صفحات -
تاریخ انتشار 2014