A Retroactive-Burst Framework for Automated Intrusion Response SystemReport as inadecuate

A Retroactive-Burst Framework for Automated Intrusion Response System - Download this document for free, or read online. Document in PDF available to download.

Journal of Computer Networks and CommunicationsVolume 2013 2013, Article ID 134760, 8 pages

Research ArticleDépartment de Genie Informatique et Génie Logiciel, École Polytechnique de Montréal, P.O. Box 6079, Succ. Downtown, Montreal, QC, Canada H3C 3A7

Received 14 December 2012; Accepted 20 February 2013

Academic Editor: Rui Zhang

Copyright © 2013 Alireza Shameli-Sendi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


The aim of this paper is to present an adaptive and cost-sensitive model to prevent security intrusions. In most automated intrusion response systems, response selection is performed locally based on current threat without using the knowledge of attacks history. Another challenge is that a group of responses are applied without any feedback mechanism to measure the response effect. We address these problems through retroactive-burst execution of responses and a Response Coordinator RC mechanism, the main contributions of this work. The retroactive-burst execution consists of several burst executions of responses with, at the end of each burst, a mechanism for measuring the effectiveness of the applied responses by the risk assessment component. The appropriate combination of responses must be considered for each burst execution to mitigate the progress of the attack without necessarily running the next round of responses, because of the impact on legitimate users. In the proposed model, there is a multilevel response mechanism. To indicate which level is appropriate to apply based on the retroactive-burst execution, we get help from a Response Coordinator mechanism. The applied responses can improve the health of Applications, Kernel, Local Services, Network Services, and Physical Status. Based on these indexes, the RC gives a general overview of an attacker’s goal in a distributed environment.

Author: Alireza Shameli-Sendi, Julien Desfossez, Michel Dagenais, and Masoume Jabbarifar

Source: https://www.hindawi.com/


Related documents