[1] |
SHAMELI-SENDI A , CHERIET M , CHERIET A . Taxonomy of intrusion risk assessment and response system[J]. Computers &Security, 2014,45: 1-16.
|
[2] |
NESPOLI P , PAPAMARTZIVANOS D , GóMEZ MáRMOL F ,et al. Optimal countermeasures selection against cyber attacks:a comprehensive survey on reaction frameworks[J]. IEEE Communications Surveys & Tutorials, 2018,20(2): 1361-1396.
|
[3] |
SOMAYAJI A , FORREST S . Automated response using system-call delay[C]// Usenix Security Symposium. Berkeley:USENIX Association, 2000: 185-197.
|
[4] |
TOTH T , KRUEGEL C . Evaluating the impact of automated intrusion response mechanisms[C]// 18th Annual Computer Security Applications Conference. Piscataway:IEEE Press, 2002: 301-310.
|
[5] |
MAROUF S , SHEHAB M , SQUICCIARINI A ,et al. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation[J]. IEEE Transactions on Services Computing, 2011,4(4): 300-313.
|
[6] |
SHAMELI-SENDI A , LOUAFI H , HE W B ,et al. Dynamic optimal countermeasure selection for intrusion response system[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(5): 755-770.
|
[7] |
GUO Y C , ZHANG H , LI Z F ,et al. Decision-making for intrusion response:which,where,in what order,and how long?[C]// 2020 IEEE International Conference on Communications. Piscataway:IEEE Press, 2020: 1-6.
|
[8] |
LI F H , LI Y J , LENG S Y ,et al. Dynamic countermeasures selection for multi-path attacks[J]. Computers & Security, 2020,97: 101927
|
[9] |
ROY A , KIM D S , TRIVEDI K S . Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees[C]// IEEE/IFIP International Conference on Dependable Systems and Networks. Piscataway:IEEE Press, 2012: 1-12.
|
[10] |
HUGHES K , MCLAUGHLIN K , SEZER S . Dynamic countermeasure knowledge for intrusion response systems[C]// 2020 31st Irish Signals and Systems Conference. Piscataway:IEEE Press, 2020: 1-6.
|
[11] |
LI X , ZHOU C J , TIAN Y C ,et al. A dynamic decision-making approach for intrusion response in industrial control systems[J]. IEEE Transactions on Industrial Informatics, 2019,15(5): 2544-2554.
|
[12] |
KOTENKO I , DOYNIKOVA E . Selection of countermeasures against network attacks based on dynamical calculation of security metrics[J]. The Journal of Defense Modeling and Simulation:Applications,Methodology,Technology, 2018,15(2): 181-204.
|
[13] |
LUO Y , SZIDAROVSZKY F , AL-NASHIF Y ,et al. A game theory based risk and impact analysis method for intrusion defense systems[C]// 2009 IEEE/ACS International Conference on Computer Systems and Applications. Piscataway:IEEE Press, 2009: 975-982.
|
[14] |
ZONOUZ S A , KHURANA H , SANDERS W H ,et al. RRE:a game-theoretic intrusion response and recovery engine[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(2): 395-406.
|
[15] |
LIANG X N , XIAO Y . Game theory for network security[J]. IEEE Communications Surveys & Tutorials, 2013,15(1): 472-486.
|
[16] |
MANSHAEI M H , ZHU Q Y , ALPCAN T ,et al. Game theory meets network security and privacy[J]. ACM Computing Surveys, 2013,45(3): 1-39.
|
[17] |
MAHARJAN S , ZHU Q Y , ZHANG Y ,et al. Dependable demand response management in the smart grid:a stackelberg game approach[J]. IEEE Transactions on Smart Grid, 2013,4(1): 120-132.
|
[18] |
KIENNERT C , ISMAIL Z , DEBAR H ,et al. A survey on game-theoretic approaches for intrusion detection and response optimization[J]. ACM Computing Surveys, 2019,51(5): 1-31.
|