SMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to S
DOI: 10.1109/icsmc.2000.884341
|View full text |Cite
|
Sign up to set email alerts
|

Adaptation techniques for intrusion detection and intrusion response systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0
1

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(39 citation statements)
references
References 5 publications
0
38
0
1
Order By: Relevance
“…• Level of automation The classification according to the level of automation has been presented in early works by several authors [25,7,19]. However, employing only these categories gives a very broad view of the response systems and hence does not provide enough information about the existing research efforts.…”
Section: Taxonomy Of Intrusion Response Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…• Level of automation The classification according to the level of automation has been presented in early works by several authors [25,7,19]. However, employing only these categories gives a very broad view of the response systems and hence does not provide enough information about the existing research efforts.…”
Section: Taxonomy Of Intrusion Response Systemsmentioning
confidence: 99%
“…The response models proposed by Foo et al [10] and Carver et al [8,7,19] are examples of an adaptive approach.…”
Section: Static Vs Adaptivementioning
confidence: 99%
See 1 more Smart Citation
“…In paper [6] they considered the problem of providing anonymity to network communication when adversaries compromise an unknown subset of nodes in the network. They invent a game-theoretic equivalent, and proved the survival of Nash equilibrium.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[11] proposed a framework that is mainly designed to create cloud networks that are immune against the Distributed Denial of Service (DDoS) attacks [12]. The utilized IDS implementation was the Open Source Snort IDS and the framework itself is designed as a Distributed Intrusion Detection System (DIDS) [13] [14]. The proposed framework supports the idea of cooperative defense by the IDS sensors in the cloud network.…”
Section: Current Statusmentioning
confidence: 99%