Using specification-based intrusion detection for automated response

被引:0
|
作者
Balepin, I [1 ]
Maltsev, S
Rowe, J
Levitt, K
机构
[1] Univ Calif Davis, Comp Secur Lab, Davis, CA 95616 USA
[2] Bauman Moscow State Tech Univ, Moscow 105005, Russia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the most controversial issues in intrusion detection is automating responses to intrusions, which can provide a more efficient, quicker, and precise way to react to an attack in progress than a human. However, it comes with several disadvantages that can lead to a waste of resources, which has so far prevented wide acceptance of automated response-enabled systems. We feel that a structured approach to the problem is needed that will account for the above mentioned disadvantages. In this work, we briefly describe what has been done in the area before. Then we start addressing the problem by coupling automated response with specification-based, host-based intrusion detection. We describe the system map, and the map-based action cost model that give us the basis for deciding on response strategy. We also show the process of suspending the attack, and designing the optimal response strategy, even in the presence of uncertainty. Finally, we discuss the implementation issues, our experience with the early automated response agent prototype, the Automated Response Broker (ARB), and suggest topics for further research.
引用
收藏
页码:136 / 154
页数:19
相关论文
共 50 条
  • [1] Specification-based intrusion detection in WLANs
    Gill, Rupinder
    Smith, Jason
    Clark, Andrew
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 141 - +
  • [2] Approach of specification-based mixed intrusion detection
    Mu, Wei
    Song, Hua
    Dai, Yiqi
    [J]. Jisuanji Gongcheng/Computer Engineering, 2005, 31 (09): : 132 - 134
  • [3] A specification-based intrusion detection model for OLSR
    Tseng, CH
    Song, T
    Balasubramanyam, P
    Ko, C
    Levitt, K
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 330 - 350
  • [4] Specification-Based Intrusion Detection Using Sequence Alignment and Data Clustering
    Kountche, Djibrilla Amadou
    Gombault, Sylvain
    [J]. FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 31 - 46
  • [5] Specification-based Intrusion Detection for Advanced Metering Infrastructures
    Berthier, Robin
    Sanders, William H.
    [J]. 2011 IEEE 17TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2011, : 184 - 193
  • [6] Toward Specification-Based Intrusion Detection for Web Applications
    Niksefat, Salman
    Ahaniha, Mohammad Mahdi
    Sadeghiyan, Babak
    Shajari, Mehdi
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 510 - 511
  • [7] Specification-based intrusion detection system for carrier ethernet
    Jieke, Pan
    Redol, Joao
    Correia, Miguel
    [J]. WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL IT: INTERNET TECHNOLOGY, 2007, : 426 - +
  • [8] Specification-based Intrusion Detection for Home Area Networks in Smart Grids
    Jokar, Paria
    Nicanfar, Hasen
    Leung, Victor C. M.
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2011,
  • [9] Standard specification-based intrusion detection for hierarchical industrial control systems
    Hotellier, Estelle
    Sicard, Franck
    Francq, Julien
    Mocanu, Stephane
    [J]. INFORMATION SCIENCES, 2024, 659
  • [10] A specification-based intrusion detection engine for infrastructure-less networks
    Panos, Christoforos
    Xenakis, Christos
    Kotzias, Platon
    Stavrakakis, Ioannis
    [J]. COMPUTER COMMUNICATIONS, 2014, 54 : 67 - 83