Loading…

Automated reaction based on risk analysis and attackers skills in intrusion detection systems

Nowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable...

Full description

Saved in:
Bibliographic Details
Main Authors: Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Araujo, J.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 124
container_issue
container_start_page 117
container_title
container_volume
creator Kanoun, W.
Cuppens-Boulahia, N.
Cuppens, F.
Araujo, J.
description Nowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasures are not adapted to the attackerpsilas actions and/or knowledge. In this paper, we propose to turn the reaction selection process intelligent by giving means to (i) quantify the effectiveness and select the countermeasure that has the minimum negative side effect on the information system by adopting a risk assessment and analysis approach, and (ii) assess the skill and knowledge level of the attacker from a defensive point of view.
doi_str_mv 10.1109/CRISIS.2008.4757471
format conference_proceeding
fullrecord <record><control><sourceid>hal_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_4757471</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4757471</ieee_id><sourcerecordid>oai_HAL_hal_00540864v1</sourcerecordid><originalsourceid>FETCH-LOGICAL-h254t-db15e20feb031f646726bb8dad8668eef350b4fc6b526d3f294e03c37412bfdb3</originalsourceid><addsrcrecordid>eNo9UE1rAjEQDW2FqvUXeNlrD2vzMUl2jyJtFYRCbaGXsiSbCaauWjax4L_viuIwMO_NvPcOQ8iY0QljtHyavS9Wi9WEU1pMQEsNmt2QPmeS5aCLr1syYMABhKClurselOiRwclT0hK4viejGH9oVxqgBNkn39ND2m9NQpe1aOoU9rvMmtjRDrQhbjKzM80xhtgBl5mUTL3BNmZxE5omZmHXdWoP8WR0mPAcEY8x4TY-kJ43TcTRZQ7J58vzx2yeL99eF7PpMl9zCSl3lknk1KOlgnkFSnNlbeGMK5QqEL2Q1IKvlZVcOeF5CUhFLTQwbr2zYkgez7lr01S_bdia9ljtTajm02V12lEqgRYK_linHZ-1ARGv4stLxT-jG2f0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Automated reaction based on risk analysis and attackers skills in intrusion detection systems</title><source>IEEE Xplore All Conference Series</source><creator>Kanoun, W. ; Cuppens-Boulahia, N. ; Cuppens, F. ; Araujo, J.</creator><creatorcontrib>Kanoun, W. ; Cuppens-Boulahia, N. ; Cuppens, F. ; Araujo, J.</creatorcontrib><description>Nowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasures are not adapted to the attackerpsilas actions and/or knowledge. In this paper, we propose to turn the reaction selection process intelligent by giving means to (i) quantify the effectiveness and select the countermeasure that has the minimum negative side effect on the information system by adopting a risk assessment and analysis approach, and (ii) assess the skill and knowledge level of the attacker from a defensive point of view.</description><identifier>ISSN: 2151-4763</identifier><identifier>ISBN: 1424433096</identifier><identifier>ISBN: 9781424433094</identifier><identifier>EISSN: 2151-478X</identifier><identifier>DOI: 10.1109/CRISIS.2008.4757471</identifier><identifier>LCCN: 2008909427</identifier><language>eng</language><publisher>IEEE</publisher><subject>attack scenario ; Communication system traffic control ; Computer Science ; countermeasure ; Counting circuits ; Cryptography and Security ; impact ; Information analysis ; Information systems ; Internet ; Intrusion detection ; Intrusion detection system ; Networking and Internet Architecture ; potentiality ; Risk analysis ; Risk management ; Security ; skill and knowledge ; Telecommunications</subject><ispartof>2008 Third International Conference on Risks and Security of Internet and Systems, 2008, p.117-124</ispartof><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4757471$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,310,311,786,790,795,796,891,2071,4069,4070,27958,54906,55271,55283</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4757471$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-00540864$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Kanoun, W.</creatorcontrib><creatorcontrib>Cuppens-Boulahia, N.</creatorcontrib><creatorcontrib>Cuppens, F.</creatorcontrib><creatorcontrib>Araujo, J.</creatorcontrib><title>Automated reaction based on risk analysis and attackers skills in intrusion detection systems</title><title>2008 Third International Conference on Risks and Security of Internet and Systems</title><addtitle>CRISIS</addtitle><description>Nowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasures are not adapted to the attackerpsilas actions and/or knowledge. In this paper, we propose to turn the reaction selection process intelligent by giving means to (i) quantify the effectiveness and select the countermeasure that has the minimum negative side effect on the information system by adopting a risk assessment and analysis approach, and (ii) assess the skill and knowledge level of the attacker from a defensive point of view.</description><subject>attack scenario</subject><subject>Communication system traffic control</subject><subject>Computer Science</subject><subject>countermeasure</subject><subject>Counting circuits</subject><subject>Cryptography and Security</subject><subject>impact</subject><subject>Information analysis</subject><subject>Information systems</subject><subject>Internet</subject><subject>Intrusion detection</subject><subject>Intrusion detection system</subject><subject>Networking and Internet Architecture</subject><subject>potentiality</subject><subject>Risk analysis</subject><subject>Risk management</subject><subject>Security</subject><subject>skill and knowledge</subject><subject>Telecommunications</subject><issn>2151-4763</issn><issn>2151-478X</issn><isbn>1424433096</isbn><isbn>9781424433094</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo9UE1rAjEQDW2FqvUXeNlrD2vzMUl2jyJtFYRCbaGXsiSbCaauWjax4L_viuIwMO_NvPcOQ8iY0QljtHyavS9Wi9WEU1pMQEsNmt2QPmeS5aCLr1syYMABhKClurselOiRwclT0hK4viejGH9oVxqgBNkn39ND2m9NQpe1aOoU9rvMmtjRDrQhbjKzM80xhtgBl5mUTL3BNmZxE5omZmHXdWoP8WR0mPAcEY8x4TY-kJ43TcTRZQ7J58vzx2yeL99eF7PpMl9zCSl3lknk1KOlgnkFSnNlbeGMK5QqEL2Q1IKvlZVcOeF5CUhFLTQwbr2zYkgez7lr01S_bdia9ljtTajm02V12lEqgRYK_linHZ-1ARGv4stLxT-jG2f0</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Kanoun, W.</creator><creator>Cuppens-Boulahia, N.</creator><creator>Cuppens, F.</creator><creator>Araujo, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>1XC</scope><scope>VOOES</scope></search><sort><creationdate>200810</creationdate><title>Automated reaction based on risk analysis and attackers skills in intrusion detection systems</title><author>Kanoun, W. ; Cuppens-Boulahia, N. ; Cuppens, F. ; Araujo, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-h254t-db15e20feb031f646726bb8dad8668eef350b4fc6b526d3f294e03c37412bfdb3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>attack scenario</topic><topic>Communication system traffic control</topic><topic>Computer Science</topic><topic>countermeasure</topic><topic>Counting circuits</topic><topic>Cryptography and Security</topic><topic>impact</topic><topic>Information analysis</topic><topic>Information systems</topic><topic>Internet</topic><topic>Intrusion detection</topic><topic>Intrusion detection system</topic><topic>Networking and Internet Architecture</topic><topic>potentiality</topic><topic>Risk analysis</topic><topic>Risk management</topic><topic>Security</topic><topic>skill and knowledge</topic><topic>Telecommunications</topic><toplevel>online_resources</toplevel><creatorcontrib>Kanoun, W.</creatorcontrib><creatorcontrib>Cuppens-Boulahia, N.</creatorcontrib><creatorcontrib>Cuppens, F.</creatorcontrib><creatorcontrib>Araujo, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kanoun, W.</au><au>Cuppens-Boulahia, N.</au><au>Cuppens, F.</au><au>Araujo, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Automated reaction based on risk analysis and attackers skills in intrusion detection systems</atitle><btitle>2008 Third International Conference on Risks and Security of Internet and Systems</btitle><stitle>CRISIS</stitle><date>2008-10</date><risdate>2008</risdate><spage>117</spage><epage>124</epage><pages>117-124</pages><issn>2151-4763</issn><eissn>2151-478X</eissn><isbn>1424433096</isbn><isbn>9781424433094</isbn><abstract>Nowadays, intrusion detection systems do not only aim to detect attacks; but they go beyond by providing reaction mechanisms to cope with detected attacks, or at least reduce their effects. Previous research works have proposed several methods to automatically select possible countermeasures capable of ending the detected attack, but without taking into account their side effects. In fact, countermeasures can be as harmful as the detected attack. Moreover, sometimes selected countermeasures are not adapted to the attackerpsilas actions and/or knowledge. In this paper, we propose to turn the reaction selection process intelligent by giving means to (i) quantify the effectiveness and select the countermeasure that has the minimum negative side effect on the information system by adopting a risk assessment and analysis approach, and (ii) assess the skill and knowledge level of the attacker from a defensive point of view.</abstract><pub>IEEE</pub><doi>10.1109/CRISIS.2008.4757471</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2151-4763
ispartof 2008 Third International Conference on Risks and Security of Internet and Systems, 2008, p.117-124
issn 2151-4763
2151-478X
language eng
recordid cdi_ieee_primary_4757471
source IEEE Xplore All Conference Series
subjects attack scenario
Communication system traffic control
Computer Science
countermeasure
Counting circuits
Cryptography and Security
impact
Information analysis
Information systems
Internet
Intrusion detection
Intrusion detection system
Networking and Internet Architecture
potentiality
Risk analysis
Risk management
Security
skill and knowledge
Telecommunications
title Automated reaction based on risk analysis and attackers skills in intrusion detection systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-09-22T02%3A27%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Automated%20reaction%20based%20on%20risk%20analysis%20and%20attackers%20skills%20in%20intrusion%20detection%20systems&rft.btitle=2008%20Third%20International%20Conference%20on%20Risks%20and%20Security%20of%20Internet%20and%20Systems&rft.au=Kanoun,%20W.&rft.date=2008-10&rft.spage=117&rft.epage=124&rft.pages=117-124&rft.issn=2151-4763&rft.eissn=2151-478X&rft.isbn=1424433096&rft.isbn_list=9781424433094&rft_id=info:doi/10.1109/CRISIS.2008.4757471&rft_dat=%3Chal_CHZPO%3Eoai_HAL_hal_00540864v1%3C/hal_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-h254t-db15e20feb031f646726bb8dad8668eef350b4fc6b526d3f294e03c37412bfdb3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4757471&rfr_iscdi=true