ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. Foo, B., Wu, Y., Mao, Y., Bagchi, S., & Spafford, E. In 2005 International Conference on Dependable Systems and Networks (DSN'05), pages 508--517, 2005. IEEE. Paper doi abstract bibtex Distributed systems with multiple interacting services, especially e-commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared to intrusion detection, automated response has received relatively less attention. In this paper, we present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus is on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. ADEPTS uses a graph of intrusion goals, called I-GRAPH, as the underlying representation in the system. In response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread of the intrusion and the appropriate responses to deploy. A feedback mechanism evaluates the success of a deployed response and uses that in guiding future choices. ADEPTS is demonstrated on a distributed e-commerce system and evaluated using a survivability metric.
@inproceedings{Foo2005,
abstract = {Distributed systems with multiple interacting services, especially e-commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared to intrusion detection, automated response has received relatively less attention. In this paper, we present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus is on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. ADEPTS uses a graph of intrusion goals, called I-GRAPH, as the underlying representation in the system. In response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread of the intrusion and the appropriate responses to deploy. A feedback mechanism evaluates the success of a deployed response and uses that in guiding future choices. ADEPTS is demonstrated on a distributed e-commerce system and evaluated using a survivability metric.},
author = {Foo, Bingrui and Wu, Yu-sung and Mao, Yu-chun and Bagchi, Saurabh and Spafford, Eugene},
booktitle = {2005 International Conference on Dependable Systems and Networks (DSN'05)},
doi = {10.1109/DSN.2005.17},
isbn = {0-7695-2282-3},
keywords = {Bayesian Network-based Security Analysis},
pages = {508--517},
publisher = {IEEE},
shorttitle = {Dependable Systems and Networks, 2005. DSN 2005. P},
title = {{ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1467825},
year = {2005}
}
Downloads: 0
{"_id":{"_str":"535ed25a97e559e8210004b6"},"__v":1,"authorIDs":[],"author_short":["Foo, B.","Wu, Y.","Mao, Y.","Bagchi, S.","Spafford, E."],"bibbaseid":"foo-wu-mao-bagchi-spafford-adeptsadaptiveintrusionresponseusingattackgraphsinanecommerceenvironment-2005","bibdata":{"bibtype":"inproceedings","type":"inproceedings","abstract":"Distributed systems with multiple interacting services, especially e-commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared to intrusion detection, automated response has received relatively less attention. In this paper, we present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus is on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. ADEPTS uses a graph of intrusion goals, called I-GRAPH, as the underlying representation in the system. In response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread of the intrusion and the appropriate responses to deploy. A feedback mechanism evaluates the success of a deployed response and uses that in guiding future choices. ADEPTS is demonstrated on a distributed e-commerce system and evaluated using a survivability metric.","author":[{"propositions":[],"lastnames":["Foo"],"firstnames":["Bingrui"],"suffixes":[]},{"propositions":[],"lastnames":["Wu"],"firstnames":["Yu-sung"],"suffixes":[]},{"propositions":[],"lastnames":["Mao"],"firstnames":["Yu-chun"],"suffixes":[]},{"propositions":[],"lastnames":["Bagchi"],"firstnames":["Saurabh"],"suffixes":[]},{"propositions":[],"lastnames":["Spafford"],"firstnames":["Eugene"],"suffixes":[]}],"booktitle":"2005 International Conference on Dependable Systems and Networks (DSN'05)","doi":"10.1109/DSN.2005.17","isbn":"0-7695-2282-3","keywords":"Bayesian Network-based Security Analysis","pages":"508--517","publisher":"IEEE","shorttitle":"Dependable Systems and Networks, 2005. DSN 2005. P","title":"ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment","url":"http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1467825","year":"2005","bibtex":"@inproceedings{Foo2005,\nabstract = {Distributed systems with multiple interacting services, especially e-commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared to intrusion detection, automated response has received relatively less attention. In this paper, we present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus is on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. ADEPTS uses a graph of intrusion goals, called I-GRAPH, as the underlying representation in the system. In response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread of the intrusion and the appropriate responses to deploy. A feedback mechanism evaluates the success of a deployed response and uses that in guiding future choices. ADEPTS is demonstrated on a distributed e-commerce system and evaluated using a survivability metric.},\nauthor = {Foo, Bingrui and Wu, Yu-sung and Mao, Yu-chun and Bagchi, Saurabh and Spafford, Eugene},\nbooktitle = {2005 International Conference on Dependable Systems and Networks (DSN'05)},\ndoi = {10.1109/DSN.2005.17},\nisbn = {0-7695-2282-3},\nkeywords = {Bayesian Network-based Security Analysis},\npages = {508--517},\npublisher = {IEEE},\nshorttitle = {Dependable Systems and Networks, 2005. DSN 2005. P},\ntitle = {{ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment}},\nurl = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1467825},\nyear = {2005}\n}\n","author_short":["Foo, B.","Wu, Y.","Mao, Y.","Bagchi, S.","Spafford, E."],"key":"Foo2005","id":"Foo2005","bibbaseid":"foo-wu-mao-bagchi-spafford-adeptsadaptiveintrusionresponseusingattackgraphsinanecommerceenvironment-2005","role":"author","urls":{"Paper":"http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1467825"},"keyword":["Bayesian Network-based Security Analysis"],"downloads":0},"bibtype":"inproceedings","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":["bayesian network-based security analysis"],"search_terms":["adepts","adaptive","intrusion","response","using","attack","graphs","commerce","environment","foo","wu","mao","bagchi","spafford"],"title":"ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment","year":2005,"dataSources":["jGrSs2aYARmRcupKy"]}