From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs)...
Published in: | Algorithms |
---|---|
Main Author: | |
Format: | Review |
Language: | English |
Published: |
MDPI AG
2017
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8 |
id |
2-s2.0-85020650273 |
---|---|
spelling |
2-s2.0-85020650273 Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions 2017 Algorithms 10 2 10.3390/a10020039 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8 In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. © 2017 by the authors. MDPI AG 19994893 English Review All Open Access; Gold Open Access |
author |
Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V. |
spellingShingle |
Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V. From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
author_facet |
Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V. |
author_sort |
Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V. |
title |
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
title_short |
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
title_full |
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
title_fullStr |
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
title_full_unstemmed |
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
title_sort |
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions |
publishDate |
2017 |
container_title |
Algorithms |
container_volume |
10 |
container_issue |
2 |
doi_str_mv |
10.3390/a10020039 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8 |
description |
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. © 2017 by the authors. |
publisher |
MDPI AG |
issn |
19994893 |
language |
English |
format |
Review |
accesstype |
All Open Access; Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1814778508442861568 |