Abstract
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design effective response techniques to circumvent intrusions when they are detected. Our approach is based on a library that implements different types of counter-measures. The idea is to design a decision support tool to help the administrator to choose, in this library, the appropriate counter-measure when a given intrusion occurs. For this purpose, we formally define the notion of anti-correlation which is used to determine the counter-measures that are effective to stop the intrusion. Finally, we present a platform of intrusion detection that implements the response mechanisms presented in this paper.
| Original language | English |
|---|---|
| Pages (from-to) | 197-217 |
| Number of pages | 21 |
| Journal | Annales des Telecommunications/Annals of Telecommunications |
| Volume | 61 |
| Issue number | 1-2 |
| DOIs | |
| Publication status | Published - 1 Jan 2006 |
| Externally published | Yes |
Keywords
- Computer security
- Correlation
- Information protection
- Intruder detector
- Logic model
- Modelling
Fingerprint
Dive into the research topics of 'Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver