From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions

In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs)...

Full description

Bibliographic Details
Main Authors: Shahid, Anwar, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Inayat, Zakira, Khan, Suleman, Anthony, Bokolo Jnr., Chang, Victor
Format: Article
Language:English
Published: MDPI AG 2017
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/17548/1/From%20Intrusion%20Detection%20to%20an%20Intrusion%20Response%20System-%20Fundamentals%2C%20Requirements%2C%20and%20Future%20Directions.pdf
_version_ 1796992110003486720
author Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Inayat, Zakira
Khan, Suleman
Anthony, Bokolo Jnr.
Chang, Victor
author_facet Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Inayat, Zakira
Khan, Suleman
Anthony, Bokolo Jnr.
Chang, Victor
author_sort Shahid, Anwar
collection UMP
description In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies.
first_indexed 2024-03-06T12:15:14Z
format Article
id UMPir17548
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T12:15:14Z
publishDate 2017
publisher MDPI AG
record_format dspace
spelling UMPir175482019-10-15T07:03:41Z http://umpir.ump.edu.my/id/eprint/17548/ From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions Shahid, Anwar Jasni, Mohamad Zain Mohamad Fadli, Zolkipli Inayat, Zakira Khan, Suleman Anthony, Bokolo Jnr. Chang, Victor QA76 Computer software In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. MDPI AG 2017 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/17548/1/From%20Intrusion%20Detection%20to%20an%20Intrusion%20Response%20System-%20Fundamentals%2C%20Requirements%2C%20and%20Future%20Directions.pdf Shahid, Anwar and Jasni, Mohamad Zain and Mohamad Fadli, Zolkipli and Inayat, Zakira and Khan, Suleman and Anthony, Bokolo Jnr. and Chang, Victor (2017) From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions. Algorithms, 10 (2). pp. 1-24. ISSN 1999-4893. (Published) http://dx.doi.org/10.3390/a10020039 doi: 10.3390/a10020039
spellingShingle QA76 Computer software
Shahid, Anwar
Jasni, Mohamad Zain
Mohamad Fadli, Zolkipli
Inayat, Zakira
Khan, Suleman
Anthony, Bokolo Jnr.
Chang, Victor
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
title From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
title_full From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
title_fullStr From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
title_full_unstemmed From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
title_short From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
title_sort from intrusion detection to an intrusion response system fundamentals requirements and future directions
topic QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/17548/1/From%20Intrusion%20Detection%20to%20an%20Intrusion%20Response%20System-%20Fundamentals%2C%20Requirements%2C%20and%20Future%20Directions.pdf
work_keys_str_mv AT shahidanwar fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections
AT jasnimohamadzain fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections
AT mohamadfadlizolkipli fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections
AT inayatzakira fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections
AT khansuleman fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections
AT anthonybokolojnr fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections
AT changvictor fromintrusiondetectiontoanintrusionresponsesystemfundamentalsrequirementsandfuturedirections