Nor Badrul Anuar
A response selection model for intrusion response systems: Response Strategy Model (RSM)
Anuar, Nor Badrul; Papadaki, Maria; Furnell, Steven; Clarke, Nathan
Authors
Maria Papadaki
Professor STEVEN FURNELL STEVEN.FURNELL@NOTTINGHAM.AC.UK
PROFESSOR OF CYBER SECURITY
Nathan Clarke
Abstract
© 2013 John Wiley & Sons, Ltd. Intrusion response systems aim to provide a systematic procedure to respond to incidents. However, with different type of response options, an automatic response system is designed to select appropriate response options automatically in order to act fast to respond to only true and critical incidents as well as minimise their impact. In addition, incidents also can be prioritised into different level of priority where some incidents may cause a serious impact (i.e. high priority) and other may not (i.e. low priority). The existing strategies inherit some limitation such as using complex approaches and less efficient in mapping appropriate response based upon incidents' priority. Therefore, this study introduces a model called response strategy model to address the aforementioned limitation. In order to validate, it was evaluated using two datasets: DARPA 2000 and private dataset. The case study results have shown a significant relationship between the incident classification and incident priorities where false incidents are likely to be categorised as low priority and true incidents are likely to be categorised as the high priority. In particular, with response strategy model, an average of 92.68% of the false incidents was prioritised as the lowest priority is better compared with only 67.07% with Snort priority.
Citation
Anuar, N. B., Papadaki, M., Furnell, S., & Clarke, N. (2014). A response selection model for intrusion response systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896
Journal Article Type | Article |
---|---|
Acceptance Date | Sep 1, 2013 |
Online Publication Date | Nov 7, 2013 |
Publication Date | Oct 24, 2014 |
Deposit Date | Sep 12, 2020 |
Journal | Security and Communication Networks |
Print ISSN | 1939-0114 |
Electronic ISSN | 1939-0122 |
Publisher | Hindawi |
Peer Reviewed | Peer Reviewed |
Volume | 7 |
Issue | 11 |
Pages | 1831-1848 |
DOI | https://doi.org/10.1002/sec.896 |
Public URL | https://nottingham-repository.worktribe.com/output/4868417 |
Publisher URL | https://onlinelibrary.wiley.com/doi/full/10.1002/sec.896 |
You might also like
Pre-Signature Scheme for Trustworthy Offline V2V Communication
(2023)
Presentation / Conference Contribution
Evaluation of Contextual and Game-Based Training for Phishing Detection
(2022)
Journal Article
Accessible authentication: Assessing the applicability for users with disabilities
(2021)
Journal Article
Developing a cyber security culture: Current practices and future needs
(2021)
Journal Article
An empirical analysis of the information security culture key factors framework
(2021)
Journal Article
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search