Research Article

A Retroactive-Burst Framework for Automated Intrusion Response System

Table 4

Plans_history database, after applying the first round of level2.

Target IP User_Name Date Time Resource Alert_Name Level_Id Round_Responses Response_success

xxx.xxx.72.131 Smith 2012/10/02 10:05:06 Filesystem Root Chroot level1 , , S
xxx.xxx.72.131 Peter 2012/10/02 10:10:23 Filesystem Root Chroot level2 , , S