The Evolution of Taxonomy of Intrusion Response Systems

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 809

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

IINC02_015

تاریخ نمایه سازی: 25 فروردین 1394

چکیده مقاله:

To ensure full security in a computer system, we need, in addition to firewalls and other anti-intrusion tools, a system called Intrusion detection and response systems whichcan recognize an intrusion and find a way to deal with it in case an attacker passes through firewall, antivirus, and all othersecurity tools. The increasing complexity and the high expansion rate of cyber-attacks in recent years has made necessary the development and implementation of detection and responding systems. In recent decades, considerable progress has been made in the realm of intrusion detection systems, but the same amountof attention has not been paid to intrusion response systems. Considering the increasing complexity and the high expansionrate of cyber-attacks, concentration of research and development in this realm has become a must. In this paper wepresentevolutionthe taxonomy of intrusion response systems, together with a review the Classification of existing intrusion response systems based on general characteristics of the beginning the year and will rise up to date.

نویسندگان

Hamed Zamanian Howach

Department of Computer ScienceU,niversityCollege of Rouzbahan Sari, I.R.Iran

Yashar Khavan

Network Inspector at Communications Regulatory Authority Tabriz, I.R.Iran

Morteza Elyasi

Department of Computer Engineering,Islamic AzadUniversity of GhaemShahr,I.R.Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • _ _ _ _ _ University, College Station, TX, 2001. ...
  • _ _ MasoumeJabbarif, and Security, VOL.12, No.1, January 2012 _ ...
  • P.G. Neumann and P.A. Porras, "Experience with EMERALD to Date" ...
  • _ _ _ intrusion response mechanisms. In ACSAC '02: Procedings ...
  • _ _ for using Assurance and Security Workshop, West Point, ...
  • _ Humphries, and L Pooch. Adaptation techniques for intrusion detection ...
  • M. Bishop. Computer Security: Art and Science. Addison-Wesley ...
  • _ Detection _ University of Vienna, 2003. ...
  • IDS: Survey on Intrusion ءه [16] Ashi shKumbhare and Manoj ...
  • _ _ _ Response, " Fourth International Conference on Network ...
  • نمایش کامل مراجع