From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs)...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2017
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/17548/1/From%20Intrusion%20Detection%20to%20an%20Intrusion%20Response%20System-%20Fundamentals%2C%20Requirements%2C%20and%20Future%20Directions.pdf http://umpir.ump.edu.my/id/eprint/17548/ http://dx.doi.org/10.3390/a10020039 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.17548 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.175482019-10-15T07:03:41Z http://umpir.ump.edu.my/id/eprint/17548/ From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Inayat, Zakira Khan, Suleman Anthony, Bokolo Jnr. Chang, Victor QA76 Computer software In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. MDPI AG 2017 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/17548/1/From%20Intrusion%20Detection%20to%20an%20Intrusion%20Response%20System-%20Fundamentals%2C%20Requirements%2C%20and%20Future%20Directions.pdf Shahid, Anwar and Jasni, Mohamad Zain and Mohamad Fadli, Zolkipli and Inayat, Zakira and Khan, Suleman and Anthony, Bokolo Jnr. and Chang, Victor (2017) From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions. Algorithms, 10 (2). pp. 1-24. ISSN 1999-4893 http://dx.doi.org/10.3390/a10020039 doi: 10.3390/a10020039 |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Inayat, Zakira Khan, Suleman Anthony, Bokolo Jnr. Chang, Victor From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
description |
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. |
format |
Article |
author |
Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Inayat, Zakira Khan, Suleman Anthony, Bokolo Jnr. Chang, Victor |
author_facet |
Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Inayat, Zakira Khan, Suleman Anthony, Bokolo Jnr. Chang, Victor |
author_sort |
Shahid, Anwar |
title |
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
title_short |
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
title_full |
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
title_fullStr |
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
title_full_unstemmed |
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions |
title_sort |
from intrusion detection to an intrusion response system: fundamentals, requirements, and future directions |
publisher |
MDPI AG |
publishDate |
2017 |
url |
http://umpir.ump.edu.my/id/eprint/17548/1/From%20Intrusion%20Detection%20to%20an%20Intrusion%20Response%20System-%20Fundamentals%2C%20Requirements%2C%20and%20Future%20Directions.pdf http://umpir.ump.edu.my/id/eprint/17548/ http://dx.doi.org/10.3390/a10020039 |
_version_ |
1648741102988034048 |
score |
13.211869 |