From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions

In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs)...

全面介紹

書目詳細資料
發表在:Algorithms
主要作者: 2-s2.0-85020650273
格式: Review
語言:English
出版: MDPI AG 2017
在線閱讀:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8
id Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
spelling Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V.
2-s2.0-85020650273
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
2017
Algorithms
10
2
10.3390/a10020039
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. © 2017 by the authors.
MDPI AG
19994893
English
Review
All Open Access; Gold Open Access; Green Open Access
author 2-s2.0-85020650273
spellingShingle 2-s2.0-85020650273
From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
author_facet 2-s2.0-85020650273
author_sort 2-s2.0-85020650273
title From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_short From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_full From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_fullStr From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_full_unstemmed From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
title_sort From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
publishDate 2017
container_title Algorithms
container_volume 10
container_issue 2
doi_str_mv 10.3390/a10020039
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8
description In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. © 2017 by the authors.
publisher MDPI AG
issn 19994893
language English
format Review
accesstype All Open Access; Gold Open Access; Green Open Access
record_format scopus
collection Scopus
_version_ 1828987879275102208