A cost-sensitive method for distributed intrusion response

A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yaorui Wu, Shufen Liu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 764
container_issue
container_start_page 760
container_title
container_volume
creator Yaorui Wu
Shufen Liu
description A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.
doi_str_mv 10.1109/CSCWD.2008.4537074
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4537074</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4537074</ieee_id><sourcerecordid>4537074</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8083d0747f94a607c6e0f0eac434265e84662f613fb2bdca05eee05cef770e83</originalsourceid><addsrcrecordid>eNpVT01Lw0AUXJGCWvMH9LJ_IPG97Ge8lWhVKHiw4LEkm7e4YpOyuxX89wbsxbkMM8x7zDB2g1AhQnPXvrXvD1UNYCuphAEjz1jRGIuylhK1Qn3-T0OzYFdz3DSgUeMFK1L6hBnztUW8ZPcr7qaUy0RjCjl8E99T_pgG7qfIh5ByDP0x08DDmOMxhWnkkdJhGhNds4XvvhIVJ16y7fpx2z6Xm9enl3a1KQMalUsLVgxzUeMb2WkwThN4oM5JIWutyEqta69R-L7uB9eBIiJQjrwxQFYs2e3f2zD7u0MM-y7-7E7rxS_8EUuQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A cost-sensitive method for distributed intrusion response</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yaorui Wu ; Shufen Liu</creator><creatorcontrib>Yaorui Wu ; Shufen Liu</creatorcontrib><description>A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.</description><identifier>ISBN: 9781424416509</identifier><identifier>ISBN: 1424416507</identifier><identifier>EISBN: 9781424416516</identifier><identifier>EISBN: 1424416515</identifier><identifier>DOI: 10.1109/CSCWD.2008.4537074</identifier><identifier>LCCN: 2007906161</identifier><language>eng</language><publisher>IEEE</publisher><subject>attack correlation ; Computer networks ; Computer science ; Computerized monitoring ; cooperative attacks ; cost calculation ; Costs ; Detectors ; Educational institutions ; Event detection ; Intrusion detection ; Intrusion response ; Large-scale systems ; Security</subject><ispartof>2008 12th International Conference on Computer Supported Cooperative Work in Design, 2008, p.760-764</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4537074$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4537074$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yaorui Wu</creatorcontrib><creatorcontrib>Shufen Liu</creatorcontrib><title>A cost-sensitive method for distributed intrusion response</title><title>2008 12th International Conference on Computer Supported Cooperative Work in Design</title><addtitle>CSCWD</addtitle><description>A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.</description><subject>attack correlation</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Computerized monitoring</subject><subject>cooperative attacks</subject><subject>cost calculation</subject><subject>Costs</subject><subject>Detectors</subject><subject>Educational institutions</subject><subject>Event detection</subject><subject>Intrusion detection</subject><subject>Intrusion response</subject><subject>Large-scale systems</subject><subject>Security</subject><isbn>9781424416509</isbn><isbn>1424416507</isbn><isbn>9781424416516</isbn><isbn>1424416515</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT01Lw0AUXJGCWvMH9LJ_IPG97Ge8lWhVKHiw4LEkm7e4YpOyuxX89wbsxbkMM8x7zDB2g1AhQnPXvrXvD1UNYCuphAEjz1jRGIuylhK1Qn3-T0OzYFdz3DSgUeMFK1L6hBnztUW8ZPcr7qaUy0RjCjl8E99T_pgG7qfIh5ByDP0x08DDmOMxhWnkkdJhGhNds4XvvhIVJ16y7fpx2z6Xm9enl3a1KQMalUsLVgxzUeMb2WkwThN4oM5JIWutyEqta69R-L7uB9eBIiJQjrwxQFYs2e3f2zD7u0MM-y7-7E7rxS_8EUuQ</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yaorui Wu</creator><creator>Shufen Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200804</creationdate><title>A cost-sensitive method for distributed intrusion response</title><author>Yaorui Wu ; Shufen Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8083d0747f94a607c6e0f0eac434265e84662f613fb2bdca05eee05cef770e83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>attack correlation</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Computerized monitoring</topic><topic>cooperative attacks</topic><topic>cost calculation</topic><topic>Costs</topic><topic>Detectors</topic><topic>Educational institutions</topic><topic>Event detection</topic><topic>Intrusion detection</topic><topic>Intrusion response</topic><topic>Large-scale systems</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Yaorui Wu</creatorcontrib><creatorcontrib>Shufen Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yaorui Wu</au><au>Shufen Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A cost-sensitive method for distributed intrusion response</atitle><btitle>2008 12th International Conference on Computer Supported Cooperative Work in Design</btitle><stitle>CSCWD</stitle><date>2008-04</date><risdate>2008</risdate><spage>760</spage><epage>764</epage><pages>760-764</pages><isbn>9781424416509</isbn><isbn>1424416507</isbn><eisbn>9781424416516</eisbn><eisbn>1424416515</eisbn><abstract>A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.</abstract><pub>IEEE</pub><doi>10.1109/CSCWD.2008.4537074</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424416509
ispartof 2008 12th International Conference on Computer Supported Cooperative Work in Design, 2008, p.760-764
issn
language eng
recordid cdi_ieee_primary_4537074
source IEEE Electronic Library (IEL) Conference Proceedings
subjects attack correlation
Computer networks
Computer science
Computerized monitoring
cooperative attacks
cost calculation
Costs
Detectors
Educational institutions
Event detection
Intrusion detection
Intrusion response
Large-scale systems
Security
title A cost-sensitive method for distributed intrusion response
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T06%3A41%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20cost-sensitive%20method%20for%20distributed%20intrusion%20response&rft.btitle=2008%2012th%20International%20Conference%20on%20Computer%20Supported%20Cooperative%20Work%20in%20Design&rft.au=Yaorui%20Wu&rft.date=2008-04&rft.spage=760&rft.epage=764&rft.pages=760-764&rft.isbn=9781424416509&rft.isbn_list=1424416507&rft_id=info:doi/10.1109/CSCWD.2008.4537074&rft_dat=%3Cieee_6IE%3E4537074%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424416516&rft.eisbn_list=1424416515&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4537074&rfr_iscdi=true