论文部分内容阅读
1 IntroductionrnSeveral active intrusion response mechanisms have been designed and prototyped, They adapt well to specificities of the monitored system, though they lack explicit and clear processes to select new security controls or evaluate existing ones.However, they have never considered risk models as recommended by ISO 27002 and ISO 27005 to assess and mitigate risks of mounted attacks [1, 2].Additionally, they have several drawbacks in cost factor assessment as well as in countermeasure selection.