Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Vol 3 No 7 (2019): Volume 3, Issue 7, July 2019 | Pages: 46-48
International Research Journal of Innovations in Engineering and Technology
OPEN ACCESS | Research Article | Published Date: 14-08-2021
We live in a time when technology is rapidly evolving, and cyber threats are becoming increasingly difficult to detect. Explore the leading topics of network security and learn how you can secure the Network against the most sophisticated cyber attacks. Following a successful exploit, the attacker can disable the target application. This survey provides Automated Invasion Response System (AIRS) for an understanding of different research in preserving the availability and of calculating systems in the fast-spreading invasions which demands advances in automated response ways of doing things and in detection sets of computer instructions. Response and Recovery Engine is the suggested approach for an automated response. Our system works on a game-theoretic response against fighters as modeled. The RRE understands the system-level security features by applying a method called attack-response trees (ART). Due to which RRE is responsible for any functions from attackers. The RRE works with Markov process that is automatically takes decision. We deploy fuzzy logic in process to as a result, the best response of optimization process of network actions. the RRE calculate the security metric values in network-level. In implementation of this logic, inputs to the network- level selection engine are first handled by fuzzy system which is in charge of a guessing and ranking of the possible actions. Gets involved in using its rule set of fuzzy.
.
This work is licensed under Creative common Attribution Non Commercial 4.0 Internation Licence