{"title":"一个可靠的成本敏感的入侵响应选择模型","authors":"A. Ikuomola, A. Sodiya","doi":"10.1109/CASoN.2012.6412406","DOIUrl":null,"url":null,"abstract":"The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. Some of these models do not consider the effectiveness of previous actions and lack standard approach for estimating associated cost. In this work, we present a model for assessing cost of responses based on three factors, the cost of damage caused by the intrusion, the cost of automatic response to an intrusion and the operational cost. The proposed approach provides consistent basis for response assessment across different systems and environment. In addition, the performance analysis indicates that automated responses systems using this cost metric COSIRS, when deployed can responds quickly enough to thwart active attacks in real time using optimal responses. The results of evaluation show that the design has better performance over existing ones.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A credible cost-sensitive model for intrusion response selection\",\"authors\":\"A. Ikuomola, A. Sodiya\",\"doi\":\"10.1109/CASoN.2012.6412406\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. Some of these models do not consider the effectiveness of previous actions and lack standard approach for estimating associated cost. In this work, we present a model for assessing cost of responses based on three factors, the cost of damage caused by the intrusion, the cost of automatic response to an intrusion and the operational cost. The proposed approach provides consistent basis for response assessment across different systems and environment. In addition, the performance analysis indicates that automated responses systems using this cost metric COSIRS, when deployed can responds quickly enough to thwart active attacks in real time using optimal responses. The results of evaluation show that the design has better performance over existing ones.\",\"PeriodicalId\":431370,\"journal\":{\"name\":\"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CASoN.2012.6412406\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CASoN.2012.6412406","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A credible cost-sensitive model for intrusion response selection
The goal of co st-sensitive response system is to ensure that response cost does not outweigh the intrusion cost. In order to ensure this, some cost-sensitive response models have been developed. Some of these models do not consider the effectiveness of previous actions and lack standard approach for estimating associated cost. In this work, we present a model for assessing cost of responses based on three factors, the cost of damage caused by the intrusion, the cost of automatic response to an intrusion and the operational cost. The proposed approach provides consistent basis for response assessment across different systems and environment. In addition, the performance analysis indicates that automated responses systems using this cost metric COSIRS, when deployed can responds quickly enough to thwart active attacks in real time using optimal responses. The results of evaluation show that the design has better performance over existing ones.