首页> 外文期刊>Security and Communications Networks >A response selection model for intrusion response systems: Response Strategy Model (RSM)
【24h】

A response selection model for intrusion response systems: Response Strategy Model (RSM)

机译:入侵响应系统的响应选择模型:响应策略模型(RSM)

获取原文
获取原文并翻译 | 示例
       

摘要

Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response options automatically in order to act fast to respond to only true and critical incidents as well as minimise their impact. In addition, incidents also can be prioritised into different level of priority where some incidents may cause a serious impact (i.e. high priority) and other may not (i.e. low priority). The existing strategies inherit some limitation such as using complex approaches and less efficient in mapping appropriate response based upon incidents' priority. Therefore, this study introduces a model called response strategy model to address the aforementioned limitation. In order to validate, it was evaluated using two datasets: DARPA 2000 and private dataset. The case study results have shown a significant relationship between the incident classification and incident priorities where false incidents are likely to be categorised as low priority and true incidents are likely to be categorised as the high priority. In particular, with response strategy model, an average of 92.68% of the false incidents was prioritised as the lowest priority is better compared with only 67.07% with Snort priority. Copyright (c) 2013 John Wiley & Sons, Ltd.
机译:入侵响应系统旨在提供响应事件的系统程序。但是,对于不同类型的响应选项,自动响应系统被设计为自动选择适当的响应选项,以便快速采取行动以仅响应真实和关键事件,并最大程度地减少其影响。此外,在某些事件可能会造成严重影响(即高优先级)而其他事件可能不会造成严重影响(即低优先级)的情况下,也可以将事件划分为不同的优先级。现有的策略继承了一些限制,例如使用复杂的方法,并且在基于事件的优先级来映射适当的响应时效率较低。因此,本研究引入了一种称为响应策略模型的模型来解决上述限制。为了验证,使用两个数据集对其进行了评估:DARPA 2000和专用数据集。案例研究结果表明,事件分类与事件优先级之间存在显着的关系,其中错误事件很可能被归类为低优先级,而真实事件则可能被归类为高优先级。特别是,采用响应策略模型时,平均优先级为92.68%的虚假事件,因为最低优先级更好,而Snort优先级只有67.07%。版权所有(c)2013 John Wiley&Sons,Ltd.

著录项

  • 来源
    《Security and Communications Networks》 |2014年第11期|1831-1848|共18页
  • 作者单位

    Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia|Univ Malaya, Secur Res Grp SECReg, Kuala Lumpur, Malaysia;

    Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England;

    Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England|Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA, Australia;

    Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England|Edith Cowan Univ, Sch Comp & Secur Sci, Perth, WA, Australia;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    intrusion response systems; risk response planning; response strategy model;

    机译:入侵响应系统;风险响应计划;响应策略模型;
  • 入库时间 2022-08-18 01:43:47

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号