“…Similar approach was taken by CITRA [21]. This framework integrates network-based intrusion detection, security management systems and network infrastructure (firewalls, routers) to detect the intrusion, trace it back to the source and coordinate local response actions based on the attack report.…”
Section: Static Mapping Vs Dynamic Mappingmentioning
confidence: 99%
“…The Cooperative Intrusion Traceback and Response Architecture (CITRA) presented in [21] provides an example of cooperative agent-based system. This architecture utilizes neighborhood structure where the information about detected intrusion is propagated back through the neighborhood to the source of the attack and submitted to the centralized authority.…”
Section: Autonomous Vs Cooperativementioning
confidence: 99%
“…Several recent tracing mechanisms take one step further offering a combination of static and dynamic mapping techniques [27,21]. TBAIR [27] framework suggests to trace the intrusion back to the source host and dynamically select the suitable response such as remote blocking of the intruder, isolation of the contaminated hosts, etc.…”
Section: Static Mapping Vs Dynamic Mappingmentioning
Recent advances in intrusion detection field brought new requirements to intrusion prevention and response. Traditionally, the response to an attack was manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years showed acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively developed, research efforts in intrusion response are still isolated. In this work we present taxonomy of intrusion response systems, together with a review of current trends in intrusion response research. We also provide a set of essential fetures as a requirement for an ideal intrusion response system.
DisciplinesInformation Security
“…Similar approach was taken by CITRA [21]. This framework integrates network-based intrusion detection, security management systems and network infrastructure (firewalls, routers) to detect the intrusion, trace it back to the source and coordinate local response actions based on the attack report.…”
Section: Static Mapping Vs Dynamic Mappingmentioning
confidence: 99%
“…The Cooperative Intrusion Traceback and Response Architecture (CITRA) presented in [21] provides an example of cooperative agent-based system. This architecture utilizes neighborhood structure where the information about detected intrusion is propagated back through the neighborhood to the source of the attack and submitted to the centralized authority.…”
Section: Autonomous Vs Cooperativementioning
confidence: 99%
“…Several recent tracing mechanisms take one step further offering a combination of static and dynamic mapping techniques [27,21]. TBAIR [27] framework suggests to trace the intrusion back to the source host and dynamically select the suitable response such as remote blocking of the intruder, isolation of the contaminated hosts, etc.…”
Section: Static Mapping Vs Dynamic Mappingmentioning
Recent advances in intrusion detection field brought new requirements to intrusion prevention and response. Traditionally, the response to an attack was manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years showed acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively developed, research efforts in intrusion response are still isolated. In this work we present taxonomy of intrusion response systems, together with a review of current trends in intrusion response research. We also provide a set of essential fetures as a requirement for an ideal intrusion response system.
DisciplinesInformation Security
“…Therefore, if an active router detects an attack attempt it will send an active packet to the other edge active router to block the attacking packets. Unlike some other approaches [10,11,12,13,14], this architecture allows the network to work without relying on a central management server.…”
“…[12] and [13] provide ways to record network traffic information through a serial of routers. We can set filters on key routers, which will then collect interesting information for us.…”
Abstract-People are benefiting tremendously from pervasively deployed WiFi networks. However, criminals may exploit the anonymity of WiFi communication and wireless routers to access illegal content such as child porn videos. It's becoming an urgent topic as regards to how to preserve and acquire network forensic data from household and small business wireless routers in order to track down criminals. In this paper, we first survey the forensic capacity of nearly all household wireless routers which are available on market. We present our analysis for people who are willing to choose a wireless router to monitor their network. Secondly, we develop a generic network forensic data logging mechanism to monitor traffic into and out of wireless routers which support OpenWrt. Our code running in the wireless routers could log network traffic and send connection information to the administrator via email.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.