A Systematic Mapping Study on Intrusion Response Systems

被引:0
作者
Rezapour, Adel [1 ]
Ghasemigol, Mohammad [2 ]
Takabi, Daniel [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Birjand Branch, Birjand 9717811111, Iran
[2] Old Dominion Univ, Sch Cybersecur, Norfolk, VA 23529 USA
关键词
Bot (Internet); Taxonomy; Data mining; Systematics; Surveys; Reviews; Intrusion detection; Decision making; Intrusion detection system; intrusion response system; systematic mapping study; APPROPRIATE COUNTER-MEASURES; COST-SENSITIVE ASSESSMENT; OPTIMAL COUNTERMEASURES; RISK-ASSESSMENT; ATTACK; MODEL; GAME; PREVENTION; SELECTION; MECHANISM;
D O I
10.1109/ACCESS.2024.3381998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing frequency and sophistication of network attacks, network administrators are facing tremendous challenges in making fast and optimum decisions during critical situations. The ability to effectively respond to intrusions requires solving a multi-objective decision-making problem. While several research studies have been conducted to address this issue, the development of a reliable and automated Intrusion Response System (IRS) remains unattainable. This paper provides a Systematic Mapping Study (SMS) for IRS, aiming to investigate the existing studies, their limitations, and future directions in this field. A novel semi-automated research methodology is developed to identify and summarize related works. The innovative approach not only streamlines the process of literature review in the IRS field but also has the potential to be adapted and implemented across a variety of research fields. As a result of this methodology, 287 papers related to the IRS were identified from a pool of 6143 studies extracted by the developed web robot based on initial keywords. This highlights its effectiveness in navigating and extracting valuable insights from the extensive body of literature. Furthermore, this research methodology allows the identification of prominent researchers, journals, conferences, and high-quality papers in the field of study.
引用
收藏
页码:46524 / 46550
页数:27
相关论文
共 290 条
  • [31] Carver C.A., 2001, Proceedings of the IEEE Workshop on Information Assurance and Security, P5
  • [32] Analytical models for risk-based intrusion response
    Caskurlu, Bugra
    Gehani, Ashish
    Bilgin, Cemal Cagatay
    Subramani, K.
    [J]. COMPUTER NETWORKS, 2013, 57 (10) : 2181 - 2192
  • [33] Chen Z., 2012, SOFTW ENG KNOWL ENG
  • [34] Chengpo Mu, 2010, Proceedings of the Third International Joint Conference on Computational Sciences and Optimization (CSO 2010), P395, DOI 10.1109/CSO.2010.30
  • [35] Chouhan PK, 2023, Arxiv, DOI arXiv:2303.03070
  • [36] Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework
    Cuppens, F
    Autrel, F
    Bouzida, Y
    Garcia, J
    Gombault, S
    Sans, T
    [J]. ANNALS OF TELECOMMUNICATIONS, 2006, 61 (1-2) : 197 - 217
  • [37] Selecting appropriate counter-measures in an intrusion detection framework
    Cuppens, F
    Gombault, S
    Sans, T
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 78 - 87
  • [38] da Silva Paulo Fernando, 2007, International Journal of Network Management, V17, P287, DOI 10.1002/nem.626
  • [39] Debar H, 2008, ADV INFORM SECUR, V38, P129
  • [40] Enabling automated threat response through the use of a dynamic security policy
    Debar, Herve
    Thomas, Yohann
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (03): : 195 - 210