{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:26:49Z","timestamp":1763389609281,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,23]]},"DOI":"10.1145\/3548636.3548649","type":"proceedings-article","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T16:09:33Z","timestamp":1661270973000},"page":"84-91","source":"Crossref","is-referenced-by-count":2,"title":["An Attack Impact and Host Importance based Approach to Intrusion Response Action Selection"],"prefix":"10.1145","author":[{"given":"Tazar","family":"Hussain","sequence":"first","affiliation":[{"name":"School of Computing, Ulster University, UK"}]},{"given":"Chris","family":"Nugent","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, UK"}]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, UK"}]},{"given":"Alfie","family":"Beard","sequence":"additional","affiliation":[{"name":"BT Labs, Adastral Park, UK"}]},{"given":"Liming","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, UK"}]},{"given":"Adrian","family":"Moore","sequence":"additional","affiliation":[{"name":"School of Computing, Ulster University, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Algorithms","volume":"10","author":"Anwar S.","unstructured":"S. Anwar , \u201c From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions ,\u201d Algorithms , vol. 10 , no. 2, Mar. 2017. S. Anwar , \u201cFrom intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions,\u201d Algorithms, vol. 10, no. 2, Mar. 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.cose.2014.04.009"},{"key":"e_1_3_2_1_3_1","volume-title":"Using machine learning to guide automated intrusion response","author":"Lopes A.","year":"2020","unstructured":"A. Lopes , \u201c Using machine learning to guide automated intrusion response .\u201d 2020 . A. Lopes, \u201cUsing machine learning to guide automated intrusion response.\u201d 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.jnca.2015.12.006"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA608707","volume-title":"A Framework for Event Prioritization in Cyber Network Defense","author":"Kim A.","year":"2014","unstructured":"A. Kim , M. Kang , J. Luo , and A. Velasquez , \u201c A Framework for Event Prioritization in Cyber Network Defense ,\u201d 2014 . A. Kim, M. Kang, J. Luo, and A. Velasquez, \u201cA Framework for Event Prioritization in Cyber Network Defense,\u201d 2014."},{"volume-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin I.","unstructured":"I. Sharafaldin , A. H. Lashkari , and A. A. Ghorbani , Toward generating a new intrusion detection dataset and intrusion traffic characterization , vol. 2018-Janua. 2018 . I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, vol. 2018-Janua. 2018.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/COMST.2017.2781126"},{"key":"e_1_3_2_1_8_1","first-page":"421","volume-title":"2020 International Conference on Computing, Networking and Communications (ICNC)","author":"Ullah S.","year":"2020","unstructured":"S. Ullah , S. Shelly , A. Hassanzadeh , A. Nayak , and K. Hasan , \u201c On the Effectiveness of Intrusion Response Systems against Persistent Threats ,\u201d in 2020 International Conference on Computing, Networking and Communications (ICNC) , 2020 , pp. 415\u2013 421 . S. Ullah, S. Shelly, A. Hassanzadeh, A. Nayak, and K. Hasan, \u201cOn the Effectiveness of Intrusion Response Systems against Persistent Threats,\u201d in 2020 International Conference on Computing, Networking and Communications (ICNC), 2020, pp. 415\u2013421."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1002\/sec.896"},{"key":"e_1_3_2_1_10_1","volume-title":"School of Electrical Engineering and Computer Science (EECS)","author":"Hers\u00e9n N.","year":"2021","unstructured":"N. Hers\u00e9n , \u201c Measuring Coverage of Attack Simulations on MAL Attack Graphs TT - T\u00e4ckv\u00e4rdesm\u00e4tning av attacksimuleringar p\u00e5 MAL attack grafer (swe) ,\u201d School of Electrical Engineering and Computer Science (EECS) , KTH , 2021 . N. Hers\u00e9n, \u201cMeasuring Coverage of Attack Simulations on MAL Attack Graphs TT - T\u00e4ckv\u00e4rdesm\u00e4tning av attacksimuleringar p\u00e5 MAL attack grafer (swe),\u201d School of Electrical Engineering and Computer Science (EECS), KTH, 2021."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.future.2020.09.002"},{"issue":"6","key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1080\/01969722.2017.1319693","article-title":"An adaptive and cost-based intrusion response system","volume":"48","author":"Nejat S. K.","year":"2017","unstructured":"S. K. Nejat and P. Kabiri , \u201c An adaptive and cost-based intrusion response system ,\u201d Cybern. Syst. , vol. 48 , no. 6 \u20137, pp. 495 \u2013 509 , Oct. 2017 . S. K. Nejat and P. Kabiri, \u201cAn adaptive and cost-based intrusion response system,\u201d Cybern. Syst., vol. 48, no. 6\u20137, pp. 495\u2013509, Oct. 2017.","journal-title":"Cybern. Syst."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/s00607-016-0495-8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.jnca.2015.05.004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/TDSC.2016.2615622"},{"key":"e_1_3_2_1_16_1","first-page":"714","volume-title":"2016 IEEE 8th International Conference on Intelligent Systems, IS 2016 - Proceedings","author":"Berenjian S.","year":"2016","unstructured":"S. Berenjian , M. Shajari , N. Farshid , and M. Hatamian , \u201c Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment ,\u201d in 2016 IEEE 8th International Conference on Intelligent Systems, IS 2016 - Proceedings , 2016 , pp. 709\u2013 714 . S. Berenjian, M. Shajari, N. Farshid, and M. Hatamian, \u201cIntelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment,\u201d in 2016 IEEE 8th International Conference on Intelligent Systems, IS 2016 - Proceedings, 2016, pp. 709\u2013714."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/COMST.2018.2885561"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings - IEEE Military Communications Conference MILCOM","volume":"5","author":"McElwee S.","year":"2017","unstructured":"S. McElwee , J. Heaton , J. Fraley , and J. Cannady , \u201c Deep learning for prioritizing and responding to intrusion detection alerts ,\u201d in Proceedings - IEEE Military Communications Conference MILCOM , 2017 , vol. 2017-Octob, pp. 1\u2013 5 . S. McElwee, J. Heaton, J. Fraley, and J. Cannady, \u201cDeep learning for prioritizing and responding to intrusion detection alerts,\u201d in Proceedings - IEEE Military Communications Conference MILCOM, 2017, vol. 2017-Octob, pp. 1\u20135."},{"volume-title":"Applied Sciences (Switzerland)","author":"Liu H.","unstructured":"H. Liu and B. Lang , \u201c Machine learning and deep learning methods for intrusion detection systems: A survey ,\u201d Applied Sciences (Switzerland) , vol. 9 , no. 20. 2019. H. Liu and B. Lang, \u201cMachine learning and deep learning methods for intrusion detection systems: A survey,\u201d Applied Sciences (Switzerland), vol. 9, no. 20. 2019.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"CEUR Workshop Proc.","volume":"2600","author":"Islam S. R.","year":"2020","unstructured":"S. R. Islam , W. Eberle , S. K. Ghafoor , A. Siraj , and M. Rogers , \u201c Domain knowledge aided explainable artificial intelligence for intrusion detection and response ,\u201d CEUR Workshop Proc. , vol. 2600 , 2020 . S. R. Islam, W. Eberle, S. K. Ghafoor, A. Siraj, and M. Rogers, \u201cDomain knowledge aided explainable artificial intelligence for intrusion detection and response,\u201d CEUR Workshop Proc., vol. 2600, 2020."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA550373","volume-title":"Determining asset criticality for cyber defense","author":"Kim A.","year":"2011","unstructured":"A. Kim and M. H. Kang , \u201c Determining asset criticality for cyber defense ,\u201d 2011 . A. Kim and M. H. Kang, \u201cDetermining asset criticality for cyber defense,\u201d 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"Common Vulnerability Scoring System version 3.1 Specification Document Revision 1","author":"FIRST","year":"2019","unstructured":"FIRST , \u201c Common Vulnerability Scoring System version 3.1 Specification Document Revision 1 ,\u201d 2019 . FIRST, \u201cCommon Vulnerability Scoring System version 3.1 Specification Document Revision 1,\u201d 2019."},{"key":"e_1_3_2_1_23_1","volume-title":"Encyclopedia of Statistical Sciences","author":"Rosenblatt J. R.","year":"2006","unstructured":"J. R. Rosenblatt , \u201c National Institute of Standards and Technology ,\u201d Encyclopedia of Statistical Sciences , 2006 . [Online]. Available: https:\/\/nvd.nist.gov\/. [Accessed: 04-Jul-2021]. J. R. Rosenblatt, \u201cNational Institute of Standards and Technology,\u201d Encyclopedia of Statistical Sciences, 2006. [Online]. Available: https:\/\/nvd.nist.gov\/. [Accessed: 04-Jul-2021]."}],"event":{"acronym":"ITCC 2022","name":"ITCC 2022: 2022 4th International Conference on Information Technology and Computer Communications","location":"Guangzhou China"},"container-title":["2022 4th International Conference on Information Technology and Computer Communications (ITCC)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548636.3548649","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548636.3548649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:39Z","timestamp":1750183839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548636.3548649"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":23,"alternative-id":["10.1145\/3548636.3548649","10.1145\/3548636"],"URL":"https:\/\/doi.org\/10.1145\/3548636.3548649","relation":{},"subject":[],"published":{"date-parts":[[2022,6,23]]}}}