...
首页> 外文期刊>Journal of computer networks and communications >A Retroactive-Burst Framework for Automated Intrusion Response System
【24h】

A Retroactive-Burst Framework for Automated Intrusion Response System

机译:自动入侵响应系统的追溯爆发框架

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC) mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker's goal in a distributed environment.
机译:本文的目的是提出一种自适应且成本敏感的模型,以防止安全入侵。在大多数自动入侵响应系统中,响应选择是基于当前威胁在本地执行的,而不使用攻击历史的知识。另一个挑战是在没有任何反馈机制的情况下应用一组响应来衡量响应效果。我们通过追溯突发响应和执行响应协调器(RC)机制来解决这些问题,这是这项工作的主要贡献。追溯突发执行由响应的多个突发执行组成,每个突发的末尾都有一种机制,用于通过风险评估组件来测量所应用响应的有效性。由于对合法用户的影响,必须为每个突发执行考虑适当的响应组合,以减轻攻击的进程,而不必运行下一轮响应。在提出的模型中,存在一个多级响应机制。为了指出基于追溯突发执行的级别,我们从响应协调器机制获得帮助。应用的响应可以改善应用程序,内核,本地服务,网络服务和物理状态的运行状况。基于这些索引,RC概述了分布式环境中攻击者的目标。

著录项

  • 来源
    《Journal of computer networks and communications》 |2013年第2013期|134760.1-134760.8|共8页
  • 作者单位

    Department de Genie Informatique et Genie Logiciel, Ecole Polytechnique de Montreal, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7;

    Department de Genie Informatique et Genie Logiciel, Ecole Polytechnique de Montreal, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7;

    Department de Genie Informatique et Genie Logiciel, Ecole Polytechnique de Montreal, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7;

    Department de Genie Informatique et Genie Logiciel, Ecole Polytechnique de Montreal, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号