Modeling Study of Priority Intrusion Response Selected on Intrusion Detection System Alert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The main purpose of the security service is to provide security for its users. One through the intrusion detection system alerts the user when there is an attack on the computer. Then, the intrusion alert not only for our information if there is suspicious activity, but also a log for analysis and take action to protect the network and information system from a threat before caused more impact. Most detection system tools provide information about intrusions that occur as high or low-priority intrusions based on what generated. This priority information would be necessary while the amount of intrusion happened very much for select options response to handle it first. The standard prioritization method in the intrusion detection system is based on the severity level defined. The other standard used is the score of common vulnerability enumeration. In this paper, we would be modeling the study some method commonly used for prioritizing the alert of the intrusion detection system. We would be using the response time management concept to experiment model.

Original languageEnglish
Title of host publicationProceedings - 2020 6th International Conference on Science and Technology, ICST 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728194721
DOIs
Publication statusPublished - 2020
Event6th International Conference on Science and Technology, ICST 2020 - Yogyakarta, Indonesia
Duration: 7 Sep 20208 Sep 2020

Publication series

NameProceedings - 2020 6th International Conference on Science and Technology, ICST 2020

Conference

Conference6th International Conference on Science and Technology, ICST 2020
Country/TerritoryIndonesia
CityYogyakarta
Period7/09/208/09/20

Keywords

  • intrusion detection system
  • intrusion response selected
  • model response
  • modeling study
  • priority intrusion

Fingerprint

Dive into the research topics of 'Modeling Study of Priority Intrusion Response Selected on Intrusion Detection System Alert'. Together they form a unique fingerprint.

Cite this