Abstract
The response taxonomy is a key to realizing automatic an intrusion response system as it provides theoretical framework for responding coherently to attacks. This paper presents a new taxonomy called 5W2H on the basis of analyzing the taxonomies, and the application prototype running over IBM Aglet is given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CERT Coordination Center.: CERT/CC Statistics 1988-2003 (2004), http://www.cert.org/stats/cert_stats.html
Cohen, F.: Simulating Cyber Attack, Defenses, and Consequence (1999), http://all.net/journal/ntb/simulate/simulate.html
Lee, W., Fan, W., et al.: Toward Cost-Sensitive Modeling for Intrusion Detection and Response. In: 1st ACM Workshop on Intrusion Detection Systems (2000)
Bishop, M.: A Taxonomy of UNIX System and Network Vulnerabilities. Tech. Rep. CSE-95-10, Purdue University (1995)
Landwehr, C.E., Bull, A.R., et al.: A taxonomy of computer program security flaws. ACM Computing Surveys 26(3), 211–254 (1994)
Lindqvist, U., Jonsson, E.: How to Systematically Classify Computer Security Intrusions. In: Proc. 1997 IEEE Symp. on Security and Privacy, Oakland, CA, pp. 154–163 (1997)
Fisch, E.A.: Intrusion Damage Control and Assessment: A Taxonomy and Implementation of Automated Responses to Intrusive Behavior. Ph. D. Dissertation, Texas A&M University, College Station, TX (1996)
Geib, C.W., Goldman, R.P.: Plan Recognition in Intrusion Detection Systems. In: DARPA Information Survivability Conference and Exposition, DISCEX (2001)
Wang, X.Y., Reeves, D.S., Wu, S.F., et al.: Sleepy Watermark Tracing: An Active Intrusion Response Framework. In: The Proceedings of 16th International Conference of Information Security, Paris, France (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Wang, G., Lan, Y., Wang, K., Liu, D. (2006). A New Automatic Intrusion Response Taxonomy and Its Application. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_139
Download citation
DOI: https://doi.org/10.1007/11610496_139
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)