Research Article

A Retroactive-Burst Framework for Automated Intrusion Response System

Table 1

Relationship between Responses and RC.

Response
name
RC Hosts
Application Kernel Local Services Network Services Physical

Linked Linked Linked Applied
Activated Activated Linked Applied Applied Applied
Activated Activated Activated Activated Applied Applied Applied
Linked Linked Linked Linked Applied Applied

Status Medium High Zero Low Medium

Index Low