Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Wael KanounNora Cuppens-BoulahiaFrédéric CuppensJosé AraujoPublished in: CRiSIS (2008)
Keyphrases
- risk analysis
- intrusion detection system
- intrusion detection
- network security
- risk assessment
- information security
- computer networks
- anomaly detection
- risk management
- network traffic
- network intrusion detection
- cyber attacks
- critical infrastructure
- computer security
- risk factors
- distributed intrusion detection
- decision making
- intrusion prevention
- influence diagrams
- fuzzy numbers
- data mining techniques
- computer systems
- network intrusion detection systems
- alert correlation
- cyber security
- neural network
- misuse detection
- security issues
- decision support system
- metadata
- real world
- fuzzy logic
- case based reasoning