Skip to Main content Skip to Navigation
Conference papers

A Response Strategy Model for Intrusion Response Systems

Abstract : There are several types of security systems, which focus on detecting, mitigating and responding to incidents. Current response systems are largely based on manual incident response selection strategies, which can introduce delays between detection and response time. However, it would be beneficial if critical and urgent incidents are addressed as soon as possible before they jeopardised critical systems. As a result, the Risk Index Model (RIM) has been proposed earlier in our previous study, as a method of prioritising incidents based upon two decision factors namely impact on assets and likelihood of threat and vulnerability. This paper extends RIM by using it as the basis for mapping incidents with various response options. The proposed mapping model, Response Strategy Model (RSM) is based on risk response planning and time management concepts and it is evaluated using the DARPA 2000 dataset. The case study analysis upon the dataset has shown a significant result in mapping incident into different quadrants. In particular, the results have shown a significant relationship between the incident classification with incident priorities where false incidents are likely to be categorised as low priority incidents and true incidents are likely to be categorised as the high priority incident.
Document type :
Conference papers
Complete list of metadata

Cited literature [11 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Thursday, May 4, 2017 - 1:45:20 PM
Last modification on : Thursday, May 4, 2017 - 2:53:55 PM
Long-term archiving on: : Saturday, August 5, 2017 - 1:22:29 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke. A Response Strategy Model for Intrusion Response Systems. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.573-578, ⟨10.1007/978-3-642-30436-1_51⟩. ⟨hal-01518222⟩



Record views


Files downloads