ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. Foo, B., Wu, Y., Mao, Y., Bagchi, S., & Spafford, E. In 2005 International Conference on Dependable Systems and Networks (DSN'05), pages 508--517, 2005. IEEE.
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment [link]Paper  doi  abstract   bibtex   
Distributed systems with multiple interacting services, especially e-commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared to intrusion detection, automated response has received relatively less attention. In this paper, we present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus is on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. ADEPTS uses a graph of intrusion goals, called I-GRAPH, as the underlying representation in the system. In response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread of the intrusion and the appropriate responses to deploy. A feedback mechanism evaluates the success of a deployed response and uses that in guiding future choices. ADEPTS is demonstrated on a distributed e-commerce system and evaluated using a survivability metric.
@inproceedings{Foo2005,
abstract = {Distributed systems with multiple interacting services, especially e-commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared to intrusion detection, automated response has received relatively less attention. In this paper, we present the design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus is on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. ADEPTS uses a graph of intrusion goals, called I-GRAPH, as the underlying representation in the system. In response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread of the intrusion and the appropriate responses to deploy. A feedback mechanism evaluates the success of a deployed response and uses that in guiding future choices. ADEPTS is demonstrated on a distributed e-commerce system and evaluated using a survivability metric.},
author = {Foo, Bingrui and Wu, Yu-sung and Mao, Yu-chun and Bagchi, Saurabh and Spafford, Eugene},
booktitle = {2005 International Conference on Dependable Systems and Networks (DSN'05)},
doi = {10.1109/DSN.2005.17},
isbn = {0-7695-2282-3},
keywords = {Bayesian Network-based Security Analysis},
pages = {508--517},
publisher = {IEEE},
shorttitle = {Dependable Systems and Networks, 2005. DSN 2005. P},
title = {{ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1467825},
year = {2005}
}

Downloads: 0