A cost-sensitive method for distributed intrusion response
A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested....
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 764 |
---|---|
container_issue | |
container_start_page | 760 |
container_title | |
container_volume | |
creator | Yaorui Wu Shufen Liu |
description | A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced. |
doi_str_mv | 10.1109/CSCWD.2008.4537074 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4537074</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4537074</ieee_id><sourcerecordid>4537074</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8083d0747f94a607c6e0f0eac434265e84662f613fb2bdca05eee05cef770e83</originalsourceid><addsrcrecordid>eNpVT01Lw0AUXJGCWvMH9LJ_IPG97Ge8lWhVKHiw4LEkm7e4YpOyuxX89wbsxbkMM8x7zDB2g1AhQnPXvrXvD1UNYCuphAEjz1jRGIuylhK1Qn3-T0OzYFdz3DSgUeMFK1L6hBnztUW8ZPcr7qaUy0RjCjl8E99T_pgG7qfIh5ByDP0x08DDmOMxhWnkkdJhGhNds4XvvhIVJ16y7fpx2z6Xm9enl3a1KQMalUsLVgxzUeMb2WkwThN4oM5JIWutyEqta69R-L7uB9eBIiJQjrwxQFYs2e3f2zD7u0MM-y7-7E7rxS_8EUuQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A cost-sensitive method for distributed intrusion response</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yaorui Wu ; Shufen Liu</creator><creatorcontrib>Yaorui Wu ; Shufen Liu</creatorcontrib><description>A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.</description><identifier>ISBN: 9781424416509</identifier><identifier>ISBN: 1424416507</identifier><identifier>EISBN: 9781424416516</identifier><identifier>EISBN: 1424416515</identifier><identifier>DOI: 10.1109/CSCWD.2008.4537074</identifier><identifier>LCCN: 2007906161</identifier><language>eng</language><publisher>IEEE</publisher><subject>attack correlation ; Computer networks ; Computer science ; Computerized monitoring ; cooperative attacks ; cost calculation ; Costs ; Detectors ; Educational institutions ; Event detection ; Intrusion detection ; Intrusion response ; Large-scale systems ; Security</subject><ispartof>2008 12th International Conference on Computer Supported Cooperative Work in Design, 2008, p.760-764</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4537074$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4537074$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yaorui Wu</creatorcontrib><creatorcontrib>Shufen Liu</creatorcontrib><title>A cost-sensitive method for distributed intrusion response</title><title>2008 12th International Conference on Computer Supported Cooperative Work in Design</title><addtitle>CSCWD</addtitle><description>A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.</description><subject>attack correlation</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Computerized monitoring</subject><subject>cooperative attacks</subject><subject>cost calculation</subject><subject>Costs</subject><subject>Detectors</subject><subject>Educational institutions</subject><subject>Event detection</subject><subject>Intrusion detection</subject><subject>Intrusion response</subject><subject>Large-scale systems</subject><subject>Security</subject><isbn>9781424416509</isbn><isbn>1424416507</isbn><isbn>9781424416516</isbn><isbn>1424416515</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVT01Lw0AUXJGCWvMH9LJ_IPG97Ge8lWhVKHiw4LEkm7e4YpOyuxX89wbsxbkMM8x7zDB2g1AhQnPXvrXvD1UNYCuphAEjz1jRGIuylhK1Qn3-T0OzYFdz3DSgUeMFK1L6hBnztUW8ZPcr7qaUy0RjCjl8E99T_pgG7qfIh5ByDP0x08DDmOMxhWnkkdJhGhNds4XvvhIVJ16y7fpx2z6Xm9enl3a1KQMalUsLVgxzUeMb2WkwThN4oM5JIWutyEqta69R-L7uB9eBIiJQjrwxQFYs2e3f2zD7u0MM-y7-7E7rxS_8EUuQ</recordid><startdate>200804</startdate><enddate>200804</enddate><creator>Yaorui Wu</creator><creator>Shufen Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200804</creationdate><title>A cost-sensitive method for distributed intrusion response</title><author>Yaorui Wu ; Shufen Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8083d0747f94a607c6e0f0eac434265e84662f613fb2bdca05eee05cef770e83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>attack correlation</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Computerized monitoring</topic><topic>cooperative attacks</topic><topic>cost calculation</topic><topic>Costs</topic><topic>Detectors</topic><topic>Educational institutions</topic><topic>Event detection</topic><topic>Intrusion detection</topic><topic>Intrusion response</topic><topic>Large-scale systems</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Yaorui Wu</creatorcontrib><creatorcontrib>Shufen Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yaorui Wu</au><au>Shufen Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A cost-sensitive method for distributed intrusion response</atitle><btitle>2008 12th International Conference on Computer Supported Cooperative Work in Design</btitle><stitle>CSCWD</stitle><date>2008-04</date><risdate>2008</risdate><spage>760</spage><epage>764</epage><pages>760-764</pages><isbn>9781424416509</isbn><isbn>1424416507</isbn><eisbn>9781424416516</eisbn><eisbn>1424416515</eisbn><abstract>A method for the evaluation of response cost is proposed. It is based on the principle that one should achieve the maximum security goal through a minimal response cost. On this basis a method for judging the causal relationship between an intrusion and a cooperative intrusion is further suggested. The intrusion response system designed according to the above response strategy can be applied to the distributed network environment. Through the cooperation of more than one management domain and a large scale study of relationships among various intrusion response costs a superior response strategy can be deduced.</abstract><pub>IEEE</pub><doi>10.1109/CSCWD.2008.4537074</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424416509 |
ispartof | 2008 12th International Conference on Computer Supported Cooperative Work in Design, 2008, p.760-764 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4537074 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | attack correlation Computer networks Computer science Computerized monitoring cooperative attacks cost calculation Costs Detectors Educational institutions Event detection Intrusion detection Intrusion response Large-scale systems Security |
title | A cost-sensitive method for distributed intrusion response |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T06%3A41%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20cost-sensitive%20method%20for%20distributed%20intrusion%20response&rft.btitle=2008%2012th%20International%20Conference%20on%20Computer%20Supported%20Cooperative%20Work%20in%20Design&rft.au=Yaorui%20Wu&rft.date=2008-04&rft.spage=760&rft.epage=764&rft.pages=760-764&rft.isbn=9781424416509&rft.isbn_list=1424416507&rft_id=info:doi/10.1109/CSCWD.2008.4537074&rft_dat=%3Cieee_6IE%3E4537074%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424416516&rft.eisbn_list=1424416515&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4537074&rfr_iscdi=true |