From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions

In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs)...

Full description

Bibliographic Details
Published in:Algorithms
Main Author: Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
Format: Review
Language:English
Published: MDPI AG 2017
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8
id 2-s2.0-85020650273
spelling 2-s2.0-85020650273
Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
2017
Algorithms
10
2
10.3390/a10020039
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. © 2017 by the authors.
MDPI AG
19994893
English
Review
All Open Access; Gold Open Access
author Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
spellingShingle Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
author_facet Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
author_sort Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
title From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_short From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_full From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_fullStr From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_full_unstemmed From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_sort From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
publishDate 2017
container_title Algorithms
container_volume 10
container_issue 2
doi_str_mv 10.3390/a10020039
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8
description In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. © 2017 by the authors.
publisher MDPI AG
issn 19994893
language English
format Review
accesstype All Open Access; Gold Open Access
record_format scopus
collection Scopus
_version_ 1814778508442861568