Asian Journal of Information Technology

Year: 2011
Volume: 10
Issue: 5
Page No. 192 - 200

Intrusion Response Systems: An Overview

Authors : Gbolahan Idowu, Oluwatoyin Enikuomehin and Suzan Olasanoye

References

Carver, C.A. and U.W. Pooch, 2000. An intrusion response taxonomy and its role in automatic intrusion response. Proceedings of the IEEE Systems, Man and Cybernetics Information Assurance and Security Workshop, June 6-7, New York, USA., pp: 129-135.

Carver, C.A., 2001. Adaptive agent-based intrusion response. Ph.D. Thesis, Department of Computer Science, Texas A and M University, College Station, Texas.

Dobrucki, M., 2003. Priority in the deployment of network intrusiondetection systems. Master's Thesis, Telecommunications Software and Multimedia Laboratory, Department of Computer Science and Engineering, Helsinki University of Technology, Espoo, Finland.

Foo, B., Y.S. Wu, Y.C. Mao, S. Bagchi and E.H. Spafford, 2005. ADEPTS: Adaptive intrusion response using attack graphs in an e-commerce environment. Proceedings of the International Conference on Dependable Systems and Networks, June 28-July 1, Yokohama, Japan, pp: 508-517.

Ilgun, K., R.A. Kemmerer and P.A. Porras, 1995. State transition analysis: A rule-based intrusion detection system. IEEE Trans. Software Eng., 21: 181-199.
CrossRef  |  Direct Link  |  

Lee, W., W. Fan, M. Miller, S. Stolfo and E. Zadok, 2002. Toward cost-sensitive modeling for intrusion detection and response. J. Comput. Secur., 10: 5-22.
Direct Link  |  

Porras, P., 1993. STAT-a state transition analysis tool for intrusion detection. Technical Report, University of California at Santa Barbara, Santa Barbara, CA., USA.

Postel, J., 1981. RFC 792: Internet control message protocol. IETF RFC Publication. http://www.rfc-ref.org/RFC-TEXTS/792/index.html.

Ragsdale, D.J., C.A. Carver, J.W. Humphries and U.W. Pooch, 2000. Adaptation techniques for intrusion detection and response systems. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Oct. 8-11, Nashville, TN., USA., pp: 2344-2349.

Roesch, M., 1999. Snort-lightweight intrusion detection for networks. Proceedings of the 13th LISA Conference on System Administration, November 7-12, 1999, Seattle, Washington, pp: 229-238.

Ryutov, T., C. Neuman, K. Dongho and Z. Li, 2003. Integrated access control and intrusion detection for web servers. Proceedings of the 23rd International Conference on Distributed Computing Systems, May 19-22, California, USA., pp: 394-401.

Stakhanova, N., S. Basu and J. Wong, 2007. A taxonomy of intrusion response systems. Int. J. Inform. Comput. Secur., 1: 169-184.
CrossRef  |  Direct Link  |  

Toth, T. and C. Kruegel, 2002. Evaluating the impact of automated intrusion response mechanisms. Proceedings of the 18th Annual Computer Security Applications Conference, (ACSAC'02), IEEE Computer Society Washington, DC., USA., pp: 301-310.

Vigna, G. and R. Kemmerer, 1998. NetSTAT: A network-based intrusion detection approach. Proceedings of the 14th Annual Computer Security Application Conference, Dec. 7-11, Phoenix, AZ., USA., pp: 25-34.

Wu, Y.S., B. Foo, Y.C. Mao, S. Bagchi and E. Spafford, 2007. Automated adaptive intrusion containment in systems of interacting services. Comput. Networks, 51: 1334-1360.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved