Vidal's library
Title: A Methodology for Using Intelligent Agents to provide Automated Intrusion Response
Author: Curtis A. Carver Jr., John M.D. Hill, John R. Surdu, and Udo W. Pooch
Book Tittle: Proceedings of the IEEE Workshop on Information Assurance and Security
Year: 2000
Abstract: This paper proposes a new methodology for adaptive, automated intrusion response (IR) using software agents. The majority of intrusion response systems (IRSs) react to attacks by generating reports or alarms. This introduces a window of vulnerability between when an intrusion is detected and when action is taken to defend against the attack. Research by Cohen indicates that the success of an attack is dependent on the time gap between detection and response. If skilled attackers are given ten hours after they are detected and before a response, they will be successful 80% of the time. At thirty hours, the attacker almost never fails. The proposed methodology addresses this window of vulnerability by providing an automated response to incidents using a heterogeneous collection of software agents. These agents collaborate to protect the computer system against attack and adapt their response tactics until the system administrator can take an active role in the defense of the system.

Cited by 26  -  Google Scholar

@InProceedings{curtis00a,
  author =	 {Curtis A. Carver Jr. and John M.D. Hill and John
                  R. Surdu and Udo W. Pooch},
  title =	 {A Methodology for Using Intelligent Agents to
                  provide Automated Intrusion Response},
  googleid =	 {AVxwxdAeMAgJ:scholar.google.com/},
  booktitle =	 {Proceedings of the {IEEE} Workshop on Information
                  Assurance and Security},
  year =	 2000,
  abstract =	 {This paper proposes a new methodology for adaptive,
                  automated intrusion response (IR) using software
                  agents. The majority of intrusion response systems
                  (IRSs) react to attacks by generating reports or
                  alarms. This introduces a window of vulnerability
                  between when an intrusion is detected and when
                  action is taken to defend against the
                  attack. Research by Cohen indicates that the success
                  of an attack is dependent on the time gap between
                  detection and response. If skilled attackers are
                  given ten hours after they are detected and before a
                  response, they will be successful 80\% of the
                  time. At thirty hours, the attacker almost never
                  fails. The proposed methodology addresses this
                  window of vulnerability by providing an automated
                  response to incidents using a heterogeneous
                  collection of software agents. These agents
                  collaborate to protect the computer system against
                  attack and adapt their response tactics until the
                  system administrator can take an active role in the
                  defense of the system.},
  keywords =     {ai application security},
  url =
                  {http://www.itoc.usma.edu/marin/Wshop/Papers2000/TP1_1.pdf},
  citeseer =	 {carver00methodology.html},
  cluster = 	 {590005433200040961}
}
Last modified: Wed Mar 9 10:14:56 EST 2011