Next Article in Journal
Fuzzy Random Walkers with Second Order Bounds: An Asymmetric Analysis
Next Article in Special Issue
Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud
Previous Article in Journal
A Spatial-Temporal-Semantic Neural Network Algorithm for Location Prediction on Moving Objects
Article Menu

Export Article

Open AccessReview
Algorithms 2017, 10(2), 39; doi:10.3390/a10020039

From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions

1
Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan
2
Center for Computer Technology & Networking Studies, Faculty of Computer & Mathematical Sciences,Universiti Teknologi MARA (UiTM), 40450 Shah Alam
3
Department of Computer Science, University of Engineering and Technology Peshawar, Peshawar 2500,
4
Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur,
5
International Business School Suzhou (IBSS), Xi’an Jiaotong-Liverpool University, 111 Ren’ai Road, SuzhouDushu Lake Science and Education Innovation Industrial Park, Suzhou 215123
*
Author to whom correspondence should be addressed.
Received: 24 February 2017 / Revised: 20 March 2017 / Accepted: 24 March 2017 / Published: 27 March 2017
(This article belongs to the Special Issue Security and Privacy in Cloud Computing Environments)
View Full-Text   |   Download PDF [1358 KB, uploaded 30 March 2017]   |  

Abstract

In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. View Full-Text
Keywords: intrusion; attacks; information security; response option; intrusion detection intrusion; attacks; information security; response option; intrusion detection
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Anwar, S.; Mohamad Zain, J.; Zolkipli, M.F.; Inayat, Z.; Khan, S.; Anthony, B.; Chang, V. From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions. Algorithms 2017, 10, 39.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Algorithms EISSN 1999-4893 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top