Abstract
Recommender systems are tools for processing and organizing information in order to give assistance to the system users. This assistance is provided by analyzing their own preferences or the preferences of their community. This paper introduces an approach based on content-based recommendation for efficient security administrators assistance in the context of reaction against intrusion detection. The proposed methodology considers the set of active contexts while analyzing the security administrator decisions historic. It provides better recommendation depending on the contexts in which the system is operating. For instance, in an automotive system, given an attack scenario, the fact that a vehicle is operating on downtown or on a highway influences countermeasures selection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Toth, T., Krügel, C.: Evaluating the impact of automated intrusion response mechanisms. In: 18th Annual Computer Security Applications Conference, 9–13 December 2002, Las Vegas, NV, USA, pp. 301–310. IEEE Computer Society (2002)
Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification-based intrusion detection for automated response. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 136–154. Springer, Heidelberg (2003). doi:10.1007/978-3-540-45248-5_8
Foo, B., Wu, Y., Mao, Y., Bagchi, S., Spafford, E.H.: ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment. In: 2005 Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, pp. 508–517, IEEE Computer Society (2005)
Pazzani, M.J., Billsus, D.: Learning and revising user profiles: the identification of interesting web sites. Mach. Learn. 27(3), 313–331 (1997)
Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: GroupLens: an open architecture for collaborative filtering of netNews. In: Proceedings of the Conference on Computer Supported Cooperative Work, CSCW 1994, pp. 175–186. ACM (1994)
Balabanovic, M., Shoham, Y.: Content-based, collaborative recommendation. Commun. ACM 40(3), 66–72 (1997)
Manouselis, N., Costopoulou, C.: Analysis and classification of multi-criteria recommender systems. World Wide Web 10(4), 415–441 (2007)
Adomavicius, G., Manouselis, N., Kwon, Y.: Multi-criteria recommender systems. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Recommender Systems Handbook, pp. 769–803. Springer, New York (2011)
Montibeller, G., Franco, A.: Multi-criteria decision analysis for strategic decision making. In: Zopounidis, C., Pardalos, P.M. (eds.) Handbook of Multicriteria Analysis, vol. 103, pp. 25–48. Springer, Heidelberg (2010)
Zeleny, M.: Multiple Criteria Decision Making. McGraw-Hill, New York (1982)
Chiprianov, V., Meyer, P., Simonin, J.: Towards a model-based multiple criteria decision aid process (2013)
Oglaza, A., Laborde, R., Zaraté, P.: Kapuer: un assistant à l’écriture de politiques d’autorisation pour la protection de la vie privée. Ingénierie des Systèmes d’Information 19(6), 91–115 (2014)
Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell. 77(2), 321–357 (1995)
Bench-Capon, T.J.M.: Persuasion in practical argument using value-based argumentation frameworks. J. Log. Comput. 13(3), 429–448 (2003)
Bouyahia, T., Autrel, F., Cuppens-Boulahia, N., Cuppens, F.: Context aware intrusion response based on argumentation logic. In: Lambrinoudakis, C., Gabillon, A. (eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 91–106. Springer, Heidelberg (2016). doi:10.1007/978-3-319-31811-0_6
Cuppens, F., Ortalo, R.: LAMBDA: a language to model a database for detection of attacks. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 197–216. Springer, Heidelberg (2000). doi:10.1007/3-540-39945-3_13
Afshari, A., Mojahed, M., Yusuff, R.M.: Simple additive weighting approach to personnel selection problem. Int. J. Innov. Manag. Technol. 1(5), 511 (2010)
Hwang, C., Lai, Y., Liu, T.: A new approach for multiple objective decision making. Comput. OR 20(8), 889–899 (1993)
Bouyssou, D., Roy, B.: Aide multicritere a la decision: Methodes et cas. Economica, Paris (1993)
Saaty, T.: The Analytic Hierarchy Process. McGraw-Hill, New York (1980)
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental security analysis of a modern automobile. In: 31st IEEE Symposium on Security and Privacy, S&P 2010, pp. 447–462. IEEE Computer Society (2010)
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Association (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Bouyahia, T., Cuppens-Boulahia, N., Cuppens, F., Autrel, F. (2017). Multi-Criteria Recommender Approach for Supporting Intrusion Response System. In: Cuppens, F., Wang, L., Cuppens-Boulahia, N., Tawbi, N., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2016. Lecture Notes in Computer Science(), vol 10128. Springer, Cham. https://doi.org/10.1007/978-3-319-51966-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-51966-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51965-4
Online ISBN: 978-3-319-51966-1
eBook Packages: Computer ScienceComputer Science (R0)