A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Expression and Deployment of Reaction Policies
2008
2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
Current prevention techniques provide restrictive responses that may take a local reaction in a limited information system infrastructure. In this paper, an in depth and comprehensive approach is introduced for responding to intrusions in an efficient way. This approach considers not only the threat and the architecture of the monitored information system, but also the security policy. The proposed reaction workflow links the lowest level of the information system corresponding to intrusion
doi:10.1109/sitis.2008.96
dblp:conf/sitis/CuppensCBKC08
fatcat:sh4fexndqjennmkqorpzivnad4