A Systematic Mapping Study on Intrusion Response Systems

被引:0
作者
Rezapour, Adel [1 ]
Ghasemigol, Mohammad [2 ]
Takabi, Daniel [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Birjand Branch, Birjand 9717811111, Iran
[2] Old Dominion Univ, Sch Cybersecur, Norfolk, VA 23529 USA
关键词
Bot (Internet); Taxonomy; Data mining; Systematics; Surveys; Reviews; Intrusion detection; Decision making; Intrusion detection system; intrusion response system; systematic mapping study; APPROPRIATE COUNTER-MEASURES; COST-SENSITIVE ASSESSMENT; OPTIMAL COUNTERMEASURES; RISK-ASSESSMENT; ATTACK; MODEL; GAME; PREVENTION; SELECTION; MECHANISM;
D O I
10.1109/ACCESS.2024.3381998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing frequency and sophistication of network attacks, network administrators are facing tremendous challenges in making fast and optimum decisions during critical situations. The ability to effectively respond to intrusions requires solving a multi-objective decision-making problem. While several research studies have been conducted to address this issue, the development of a reliable and automated Intrusion Response System (IRS) remains unattainable. This paper provides a Systematic Mapping Study (SMS) for IRS, aiming to investigate the existing studies, their limitations, and future directions in this field. A novel semi-automated research methodology is developed to identify and summarize related works. The innovative approach not only streamlines the process of literature review in the IRS field but also has the potential to be adapted and implemented across a variety of research fields. As a result of this methodology, 287 papers related to the IRS were identified from a pool of 6143 studies extracted by the developed web robot based on initial keywords. This highlights its effectiveness in navigating and extracting valuable insights from the extensive body of literature. Furthermore, this research methodology allows the identification of prominent researchers, journals, conferences, and high-quality papers in the field of study.
引用
收藏
页码:46524 / 46550
页数:27
相关论文
共 290 条
  • [121] New multi-objective approach for dynamic risk-driven intrusion responses
    Katar, Chaker
    Badreddine, Ahmed
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (01) : 230 - 232
  • [122] Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture
    Kaur, Manpreet
    Lindskog, Dale
    Zavarsky, Pavol
    [J]. AD HOC NETWORKS, ADHOCNETS 2017, 2018, 223 : 69 - 80
  • [123] Keshariya A, 2010, LECT NOTES COMPUT SC, V5939, P222
  • [124] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [125] Kheir N, 2010, LECT NOTES COMPUT SC, V6345, P626, DOI 10.1007/978-3-642-15497-3_38
  • [126] Kheir N, 2009, LECT NOTES COMPUT SC, V5587, P176, DOI 10.1007/978-3-642-02918-9_11
  • [127] A risk mitigation approach for autonomous cloud intrusion response system
    Kholidy, Hisham A.
    Erradi, Abdelkarim
    Abdelwahed, Sherif
    Baiardi, Fabrizio
    [J]. COMPUTING, 2016, 98 (11) : 1111 - 1135
  • [128] A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization
    Kiennert, Christophe
    Ismail, Ziad
    Debar, Herve
    Leneutre, Jean
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (05)
  • [129] Klein G., 2010, 2010 Proceedings of European Conference on Computer Network Defense (EC2ND 2010), P55, DOI 10.1109/EC2ND.2010.11
  • [130] Kreidl O. P., 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W), P156, DOI 10.1109/DSNW.2010.5542603