Skip to main content

Towards a Temporal Response Taxonomy

  • Conference paper
Data Privacy Management and Autonomous Spontaneous Security (DPM 2012, SETOP 2012)

Abstract

Response systems play a growing role in modern security architectures. In order to select the most effective countermeasure, they adopt a dynamic and situation-aware approach. However, today’s response systems are limited to the selection procedure. In other words, the follow-up and the deactivation phases are still performed manually. Consequently, existing response taxonomies failed to provide an appropriate set of requirements that covers the deactivation feature. In this paper, we tackle this issue by proposing a formal temporal taxonomy for response measures. Furthermore, we present an application of our work in the context of simultaneous attacks. This work provides a first step towards the deactivation and the transactional management of response measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foo, B., Wu, Y.S., Mao, Y.C., Bagchi, S., Spafford, E.: Adepts: Adaptive intrusion response using attack graphs in an e-commerce environment. In: International Conference on Dependable Systems and Networks, pp. 508–517 (2005)

    Google Scholar 

  2. Wei, H., Frinke, D., Carter, O., Ritter, C.: Cost-benefit analysis for network intrusion detection systems. In: 28th Annual Computer Security Conference (CSI 2001) (October 2001)

    Google Scholar 

  3. Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC 2002, p. 301. IEEE Computer Society, Las Vegas (2002)

    Chapter  Google Scholar 

  4. Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10(1/2), 5–22 (2002)

    Google Scholar 

  5. Balepin, I., Maltsev, S., Rowe, J., Levitt, K.N.: Using Specification-Based Intrusion Detection for Automated Response. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 136–154. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Stakhanova, N., Basu, S., Wong, J.: A cost-sensitive model for preemptive intrusion response systems. In: Proceedings of the 21st International Conference on Advanced Networking and Applications, AINA 2007, pp. 428–435. IEEE Computer Society, Washington, DC (2007)

    Chapter  Google Scholar 

  7. Jahnke, M., Thul, C., Martini, P.: Graph based metrics for intrusion response measures in computer networks. In: Proceedings of the 32nd IEEE Conference on Local Computer Networks, LCN 2007, pp. 1035–1042. IEEE Computer Society, Washington, DC (2007)

    Google Scholar 

  8. Kheir, N.: Response Policies and Countermeasures: Management of Service Dependencies and Intrusion and Reaction Impacts. PhD thesis, Telecom Bretagne (2010)

    Google Scholar 

  9. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F.: Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141, pp. 58–70. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Kanoun, W.: Intelligent Risk-Aware System for Activating and Deactivating Policy-Based Response. PhD thesis, Telecom Bretagne (2011)

    Google Scholar 

  11. Irvine, C., Levin, T.: Toward a taxonomy and costing method for security services. In: Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), pp. 183–188 (1999)

    Google Scholar 

  12. Carver, C., Pooch, U.: An intrusion response taxonomy and its role in automatic intrusion response. In: The 2000 IEEE Workshop on Information Assurance and Security (June 2000)

    Google Scholar 

  13. Wang, H., Wang, G., Lan, Y., Wang, K., Liu, D.: A New Automatic Intrusion Response Taxonomy and Its Application. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb 2006 Workshops. LNCS, vol. 3842, pp. 999–1003. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. International Journal of Information and Computer Security 1(1/2), 169–184 (2007)

    Article  Google Scholar 

  15. Kanoun, W., Cuppens-Boulahia, N., Cuppens, F., Dubus, S.: Risk-aware framework for activating and deactivating policy-based response. In: The fourth International Conference on Network and System Security (NSS 2010), Melbourne, Australia (September 2010)

    Google Scholar 

  16. Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE Policy (June 2003)

    Google Scholar 

  17. Cuppens, F., Cuppens-Boulahia, N., Kanoun, W., Croissant, A.: A Formal Framework to Specify and Deploy Reaction Policies. In: Web-Based Information Technologies and Distributed Systems, pp. 159–188. Atlantis Press, Paris (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kanoun, W., Samarji, L., Cuppens-Boulahia, N., Dubus, S., Cuppens, F. (2013). Towards a Temporal Response Taxonomy. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35890-6_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35889-0

  • Online ISBN: 978-3-642-35890-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics