Informing the decision process in an automated intrusion response system

Information Security Technical Report - Tập 10 - Trang 150-161 - 2005
M. Papadaki1, S.M. Furnell1
1Network Research Group, School of Computing, Communications and Electronics, University of Plymouth, Drake Circus, Plymouth PL4 8AA, UK

Tài liệu tham khảo

Allen, 2000 Bace, 2001 Carver Jr CA, Hill JMD, Pooch UW. Limiting uncertainty in intrusion response. In: Second annual IEEE systems, man, and cybernetics information assurance and security workshop, West Point, New York; June 5–6, 2001. Davey J. The CCTA risk analysis and management methodology (CRAMM). Current perspectives in healthcare computing; 1991. p. 360–5. Doyle, 2003 ISS. RealSecure SiteProtector Security Fusion Module 2.0: Frequently Asked Questions Mandia, 2001 MIT, 2001 Nmap Papadaki M. Classifying and responding to network intrusions, PhD thesis. Plymouth, United Kingdom: University of Plymouth; 2004. Papadaki M, Furnell SM. Automating the process of intrusion response. In: Proceedings of the fifth Australian information warfare & security conference, 25–26 November, Perth Western, Australia; 2004. Papadaki M, Furnell SM, Lines BM, Reynolds PL. A response-oriented taxonomy of IT system intrusions. In: Roccetti M, editor. Proceedings of Euromedia 2002, 15–17 April, Modena, Italy; 2002. p. 87–95. Porras, 1997, EMERALD: event monitoring enabling responses to anomalous live disturbances SANS, 2004 Singh H. A correlation framework for continuous user authentication using data mining, PhD thesis. Plymouth, United Kingdom: University of Plymouth; 2003. Toth, 2002, Evaluating the impact of automated intrusion response mechanisms