Next Article in Journal
Fuzzy Random Walkers with Second Order Bounds: An Asymmetric Analysis
Next Article in Special Issue
Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud
Previous Article in Journal
A Spatial-Temporal-Semantic Neural Network Algorithm for Location Prediction on Moving Objects
Open AccessReview

From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions

Faculty of Computer Systems & Software Engineering (FSKKP), Universiti Malaysia Pahang, LebuhrayaTun Razak Gambang, 26300 Kuantan
Center for Computer Technology & Networking Studies, Faculty of Computer & Mathematical Sciences,Universiti Teknologi MARA (UiTM), 40450 Shah Alam, Malaysia
Department of Computer Science, University of Engineering and Technology Peshawar, Peshawar 2500, Pakistan
Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur,
International Business School Suzhou (IBSS), Xi’an Jiaotong-Liverpool University, 111 Ren’ai Road, SuzhouDushu Lake Science and Education Innovation Industrial Park, Suzhou 215123
Author to whom correspondence should be addressed.
Algorithms 2017, 10(2), 39;
Received: 24 February 2017 / Revised: 20 March 2017 / Accepted: 24 March 2017 / Published: 27 March 2017
(This article belongs to the Special Issue Security and Privacy in Cloud Computing Environments)
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies. View Full-Text
Keywords: intrusion; attacks; information security; response option; intrusion detection intrusion; attacks; information security; response option; intrusion detection
Show Figures

Figure 1

MDPI and ACS Style

Anwar, S.; Mohamad Zain, J.; Zolkipli, M.F.; Inayat, Z.; Khan, S.; Anthony, B.; Chang, V. From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions. Algorithms 2017, 10, 39.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop