Research Article
A Retroactive-Burst Framework for Automated Intrusion Response System
Table 1
Relationship between Responses and RC.
| Response name | RC | Hosts | Application | Kernel | Local Services | Network Services | Physical | | | | | | | | | | | | | | | | | |
| | Linked | | Linked | Linked | | | | Applied | | | | | Activated | Activated | | Linked | | Applied | Applied | Applied | | | | | Activated | Activated | | Activated | Activated | Applied | | Applied | | | Applied | | Linked | | Linked | Linked | Linked | | Applied | | Applied | | | | | | | | | | | | | | |
| Status | Medium | High | Zero | Low | Medium | | | | | | |
| Index | | |
Low | | | | | | | | |
|
|