Intrusion Response Systems: Foundations, Design, and Challenges

In the last few decades, various network attacks have emerged. This phenomenon requires serious consideration to address its extensive consequences. To overcome the effects of network attacks, an appropriate intrusion detection system and a real-time intrusion response system are required. In this p...

Full description

Bibliographic Details
Main Authors: Zakira, Inayat, Abdullah, Gani, Nor Badrul, Anuar, Muhammad Khuram, Khan, Shahid, Anwar
Format: Article
Published: Elsevier 2016
Subjects:
_version_ 1796991037741203456
author Zakira, Inayat
Abdullah, Gani
Nor Badrul, Anuar
Muhammad Khuram, Khan
Shahid, Anwar
author_facet Zakira, Inayat
Abdullah, Gani
Nor Badrul, Anuar
Muhammad Khuram, Khan
Shahid, Anwar
author_sort Zakira, Inayat
collection UMP
description In the last few decades, various network attacks have emerged. This phenomenon requires serious consideration to address its extensive consequences. To overcome the effects of network attacks, an appropriate intrusion detection system and a real-time intrusion response system are required. In this paper, we present an IRS taxonomy based on design parameters to classify existing schemes. Furthermore, we investigate the essential response design parameters for IRS to mitigate attacks in real time and obtain a robust output. The majority of existing schemes disregard the importance of semantic coherence and dynamic response parameters in the response selection process. Therefore, most existing schemes produce inaccurate results by generating false alarms. These design parameters are comprehensively discussed in this paper. We have qualitatively analyzed existing IRS schemes on the basis of the response design parameters. Open research challenges are identified to highlight key research areas in this research domain.
first_indexed 2024-03-06T12:00:23Z
format Article
id UMPir11801
institution Universiti Malaysia Pahang
last_indexed 2024-03-06T12:00:23Z
publishDate 2016
publisher Elsevier
record_format dspace
spelling UMPir118012019-10-15T07:30:24Z http://umpir.ump.edu.my/id/eprint/11801/ Intrusion Response Systems: Foundations, Design, and Challenges Zakira, Inayat Abdullah, Gani Nor Badrul, Anuar Muhammad Khuram, Khan Shahid, Anwar QA76 Computer software In the last few decades, various network attacks have emerged. This phenomenon requires serious consideration to address its extensive consequences. To overcome the effects of network attacks, an appropriate intrusion detection system and a real-time intrusion response system are required. In this paper, we present an IRS taxonomy based on design parameters to classify existing schemes. Furthermore, we investigate the essential response design parameters for IRS to mitigate attacks in real time and obtain a robust output. The majority of existing schemes disregard the importance of semantic coherence and dynamic response parameters in the response selection process. Therefore, most existing schemes produce inaccurate results by generating false alarms. These design parameters are comprehensively discussed in this paper. We have qualitatively analyzed existing IRS schemes on the basis of the response design parameters. Open research challenges are identified to highlight key research areas in this research domain. Elsevier 2016 Article PeerReviewed Zakira, Inayat and Abdullah, Gani and Nor Badrul, Anuar and Muhammad Khuram, Khan and Shahid, Anwar (2016) Intrusion Response Systems: Foundations, Design, and Challenges. Journal of Network and Computer Applications, 62. pp. 53-74. ISSN 1084-8045. (Published) http://dx.doi.org/10.1016/j.jnca.2015.12.006 DOI: 10.1016/j.jnca.2015.12.006
spellingShingle QA76 Computer software
Zakira, Inayat
Abdullah, Gani
Nor Badrul, Anuar
Muhammad Khuram, Khan
Shahid, Anwar
Intrusion Response Systems: Foundations, Design, and Challenges
title Intrusion Response Systems: Foundations, Design, and Challenges
title_full Intrusion Response Systems: Foundations, Design, and Challenges
title_fullStr Intrusion Response Systems: Foundations, Design, and Challenges
title_full_unstemmed Intrusion Response Systems: Foundations, Design, and Challenges
title_short Intrusion Response Systems: Foundations, Design, and Challenges
title_sort intrusion response systems foundations design and challenges
topic QA76 Computer software
work_keys_str_mv AT zakirainayat intrusionresponsesystemsfoundationsdesignandchallenges
AT abdullahgani intrusionresponsesystemsfoundationsdesignandchallenges
AT norbadrulanuar intrusionresponsesystemsfoundationsdesignandchallenges
AT muhammadkhuramkhan intrusionresponsesystemsfoundationsdesignandchallenges
AT shahidanwar intrusionresponsesystemsfoundationsdesignandchallenges