The Evolution of Taxonomy of Intrusion Response Systems

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 831

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

IINC02_015

تاریخ نمایه سازی: 25 فروردین 1394

Abstract:

To ensure full security in a computer system, we need, in addition to firewalls and other anti-intrusion tools, a system called Intrusion detection and response systems whichcan recognize an intrusion and find a way to deal with it in case an attacker passes through firewall, antivirus, and all othersecurity tools. The increasing complexity and the high expansion rate of cyber-attacks in recent years has made necessary the development and implementation of detection and responding systems. In recent decades, considerable progress has been made in the realm of intrusion detection systems, but the same amountof attention has not been paid to intrusion response systems. Considering the increasing complexity and the high expansionrate of cyber-attacks, concentration of research and development in this realm has become a must. In this paper wepresentevolutionthe taxonomy of intrusion response systems, together with a review the Classification of existing intrusion response systems based on general characteristics of the beginning the year and will rise up to date.

Authors

Hamed Zamanian Howach

Department of Computer ScienceU,niversityCollege of Rouzbahan Sari, I.R.Iran

Yashar Khavan

Network Inspector at Communications Regulatory Authority Tabriz, I.R.Iran

Morteza Elyasi

Department of Computer Engineering,Islamic AzadUniversity of GhaemShahr,I.R.Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • _ _ _ _ _ University, College Station, TX, 2001. ...
  • _ _ MasoumeJabbarif, and Security, VOL.12, No.1, January 2012 _ ...
  • P.G. Neumann and P.A. Porras, "Experience with EMERALD to Date" ...
  • _ _ _ intrusion response mechanisms. In ACSAC '02: Procedings ...
  • _ _ for using Assurance and Security Workshop, West Point, ...
  • _ Humphries, and L Pooch. Adaptation techniques for intrusion detection ...
  • M. Bishop. Computer Security: Art and Science. Addison-Wesley ...
  • _ Detection _ University of Vienna, 2003. ...
  • IDS: Survey on Intrusion ءه [16] Ashi shKumbhare and Manoj ...
  • _ _ _ Response, " Fourth International Conference on Network ...
  • نمایش کامل مراجع