A Retroactive-Burst Framework for Automated Intrusion Response System

The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of...

Full description

Saved in:
Bibliographic Details
Main Authors: Alireza Shameli-Sendi, Julien Desfossez, Michel Dagenais, Masoume Jabbarifar
Format: Article
Language:English
Published: Wiley 2013-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2013/134760
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator (RC) mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.
ISSN:2090-7141
2090-715X