%0 Conference Proceedings %T A Response Strategy Model for Intrusion Response Systems %+ Centre for Security, Communications and Network Research (CSCAN) %+ Faculty of Computer Science and Information Technology [Kuala Lumpur] %+ School of Computer and Security Science %+ School of Computer and Information Science [Edith Cowan University] %A Anuar, Nor, Badrul %A Papadaki, Maria %A Furnell, Steven %A Clarke, Nathan, L. %Z Part 13: Short Papers %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 27th Information Security and Privacy Conference (SEC) %C Heraklion, Crete, Greece %Y Dimitris Gritzalis %Y Steven Furnell %Y Marianthi Theoharidou %I Springer %3 Information Security and Privacy Research %V AICT-376 %P 573-578 %8 2012-06-12 %D 2012 %R 10.1007/978-3-642-30436-1_51 %K intrusion response systems %K risk response planning %K response strategy model %Z Computer Science [cs]Conference papers %X There are several types of security systems, which focus on detecting, mitigating and responding to incidents. Current response systems are largely based on manual incident response selection strategies, which can introduce delays between detection and response time. However, it would be beneficial if critical and urgent incidents are addressed as soon as possible before they jeopardised critical systems. As a result, the Risk Index Model (RIM) has been proposed earlier in our previous study, as a method of prioritising incidents based upon two decision factors namely impact on assets and likelihood of threat and vulnerability. This paper extends RIM by using it as the basis for mapping incidents with various response options. The proposed mapping model, Response Strategy Model (RSM) is based on risk response planning and time management concepts and it is evaluated using the DARPA 2000 dataset. The case study analysis upon the dataset has shown a significant result in mapping incident into different quadrants. In particular, the results have shown a significant relationship between the incident classification with incident priorities where false incidents are likely to be categorised as low priority incidents and true incidents are likely to be categorised as the high priority incident. %G English %2 https://inria.hal.science/hal-01518222/document %2 https://inria.hal.science/hal-01518222/file/978-3-642-30436-1_51_Chapter.pdf %L hal-01518222 %U https://inria.hal.science/hal-01518222 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-376