A Systematic Mapping Study on Intrusion Response Systems

被引:0
作者
Rezapour, Adel [1 ]
Ghasemigol, Mohammad [2 ]
Takabi, Daniel [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Birjand Branch, Birjand 9717811111, Iran
[2] Old Dominion Univ, Sch Cybersecur, Norfolk, VA 23529 USA
关键词
Bot (Internet); Taxonomy; Data mining; Systematics; Surveys; Reviews; Intrusion detection; Decision making; Intrusion detection system; intrusion response system; systematic mapping study; APPROPRIATE COUNTER-MEASURES; COST-SENSITIVE ASSESSMENT; OPTIMAL COUNTERMEASURES; RISK-ASSESSMENT; ATTACK; MODEL; GAME; PREVENTION; SELECTION; MECHANISM;
D O I
10.1109/ACCESS.2024.3381998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing frequency and sophistication of network attacks, network administrators are facing tremendous challenges in making fast and optimum decisions during critical situations. The ability to effectively respond to intrusions requires solving a multi-objective decision-making problem. While several research studies have been conducted to address this issue, the development of a reliable and automated Intrusion Response System (IRS) remains unattainable. This paper provides a Systematic Mapping Study (SMS) for IRS, aiming to investigate the existing studies, their limitations, and future directions in this field. A novel semi-automated research methodology is developed to identify and summarize related works. The innovative approach not only streamlines the process of literature review in the IRS field but also has the potential to be adapted and implemented across a variety of research fields. As a result of this methodology, 287 papers related to the IRS were identified from a pool of 6143 studies extracted by the developed web robot based on initial keywords. This highlights its effectiveness in navigating and extracting valuable insights from the extensive body of literature. Furthermore, this research methodology allows the identification of prominent researchers, journals, conferences, and high-quality papers in the field of study.
引用
收藏
页码:46524 / 46550
页数:27
相关论文
共 290 条
  • [1] Adetoye A., 2003, Tech. Rep.
  • [2] Alampalayam S., 2007, Ph.D. dissertation
  • [3] Alazab Ammar, 2014, Information Management & Computer Security, V22, P431, DOI 10.1108/IMCS-02-2013-0007
  • [4] Cyberattacks and Countermeasures for In-Vehicle Networks
    Aliwa, Emad
    Rana, Omer
    Perera, Charith
    Burnap, Peter
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (01)
  • [5] [Anonymous], 2012, C RANKS LOOKUP RANK
  • [6] Anuar N. B., 2010, PROC INF SECUR, P1
  • [7] Anuar N. B., 2009, PROC 5 COLLAB ORATIV, P3
  • [8] A response selection model for intrusion response systems: Response Strategy Model (RSM)
    Anuar, Nor Badrul
    Papadaki, Maria
    Furnell, Steven
    Clarke, Nathan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1831 - 1848
  • [9] From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
    Anwar S.
    Zain J.M.
    Zolkipli M.F.
    Inayat Z.
    Khan S.
    Anthony B.
    Chang V.
    [J]. Anwar, Shahid (shahidanwar.safi@gmail.com), 1600, MDPI AG (10):
  • [10] Anwar S, 2015, 2015 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND COMPUTER SYSTEMS (ICSECS), P195, DOI 10.1109/ICSECS.2015.7333109