2015 Ninth International Conference on IT Security Incident Management &Amp; IT Forensics 2015
DOI: 10.1109/imf.2015.13
|View full text |Cite
|
Sign up to set email alerts
|

Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?

Abstract: The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate suitable reactions. However, initiating a suitable reaction is a process of selecting an appropriate response related to the identified network-based attack. The process of selecting a response requires to take into account the economics of an reaction e.g., ris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…We want to note that much of the alert correlation work, e.g., [49], which relies on misuse-based IDS, assumes that raised alerts can be treated as an attack, i.e., single-stage attack or attack step. Based on those assumptions, a lot of work exists that identifies multistaged attacks by analyzing those alerts.…”
Section: Delimitation From Soaaprmentioning
confidence: 99%
“…We want to note that much of the alert correlation work, e.g., [49], which relies on misuse-based IDS, assumes that raised alerts can be treated as an attack, i.e., single-stage attack or attack step. Based on those assumptions, a lot of work exists that identifies multistaged attacks by analyzing those alerts.…”
Section: Delimitation From Soaaprmentioning
confidence: 99%
“…They state several propagation patterns in which they consider not only the damage caused by the propagation of dependency's functionality loss but also other types of propagation, such as the propagation of positive effects and propagation of the dependent service's compromise on its dependencies. The response selection model (REASSESS) [13] allows mitigating network-based attacks by incorporating a response selection process that evaluates negative and positive impacts associated with each countermeasure. The considered negative effects are the disturbance of the service caused by the action, which takes into account the importance of the service and the level of disturbance.…”
Section: Related Workmentioning
confidence: 99%
“…Many work, for instance [5], make assumptions for response planning that each alert raised by a detection engine is treated as one attack. The aggregation and fusion of alarms should be taken into account by the detection system but they assume 100% confidence of the alerts.…”
Section: B Analysismentioning
confidence: 99%
“…The alert analysis and planning as well as executing appropriate reactions can no longer be clamped by humans. Also under the circumstances that manual operation cannot guarantee the response time and accuracy, an efficient automatic decision-making support method is desperately needed [5]. New approaches for instance applying machine learning techniques help to handle the detection of massive input data.…”
Section: Introductionmentioning
confidence: 99%