Model-Based Response Planning Strategies for Autonomic Intrusion Protection

被引:18
作者
Iannucci, Stefano [1 ]
Abdelwahed, Sherif [2 ]
机构
[1] Mississippi State Univ, 665 George Perry St, Mississippi State, MS 39762 USA
[2] Virginia Commonwealth Univ, 907 Floyd Ave, Richmond, VA 23284 USA
关键词
Intrusion response system; autonomic intrusion protection; SYSTEMS;
D O I
10.1145/3168446
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The continuous increase in the quantity and sophistication of cyberattacks is making it more difficult and error prone for system administrators to handle the alerts generated by intrusion detection systems (IDSs). To deal with this problem, several intrusion response systems (IRSs) have been proposed lately. IRSs extend the IDSs by providing an automatic response to the detected attack. Such a response is usually selected either with a static attack-response mapping or by quantitatively evaluating all available responses, given a set of predefined criteria. In this article, we introduce a probabilistic model-based IRS built on the Markov decision process (MDP) framework. In contrast to most existing approaches to intrusion response, the proposed IRS effectively captures the dynamics of both the defended system and the attacker and is able to compose atomic response actions to plan optimal multiobjective long-term response policies to protect the system. We evaluate the effectiveness of the proposed IRS by showing that long-term response planning always outperforms short-term planning, and we conduct a thorough performance assessment to show that the proposed IRS can be adopted to protect large distributed systems at runtime.
引用
收藏
页数:23
相关论文
共 47 条
[1]   On the application of predictive control techniques for adaptive performance management of computing systems [J].
Abdelwahed, Sherif ;
Bai, Jia ;
Su, Rong ;
Kandasamy, Nagarajan .
IEEE Transactions on Network and Service Management, 2009, 6 (04) :212-225
[2]  
Akamai, 2015, AK STAT INT Q3 2015
[3]  
[Anonymous], 2007, 1 FORUM INCIDENT RES
[4]  
[Anonymous], 2008, INT C MACH LEARN ICM, DOI 10.1145/1390156.1390187
[5]  
[Anonymous], 1981, LECT NOTES EC MATH S
[6]  
[Anonymous], 1996, INTRO BAYESIAN NETWO
[7]  
[Anonymous], 2015, PROC 2 ACM WORKSHOP
[8]  
Bellman R. E., 1957, Dynamic programming. Princeton landmarks in mathematics
[9]   Learning Deep Architectures for AI [J].
Bengio, Yoshua .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01) :1-127
[10]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336