Academia.eduAcademia.edu

Figure 1: Intrusion Response Strategy  The second step is charged by defining possible damages caused by intrusion on victim computer/information system using fuzzy cognitive map which describes possible influences between components of victim system. The third and final step of proposed response strategy should make valuable direct (automated) or indirect (not automated) response by sending advising message to system administrator or by charging mobile agents by appropriate remedies and correctives.

Figure 1 Intrusion Response Strategy The second step is charged by defining possible damages caused by intrusion on victim computer/information system using fuzzy cognitive map which describes possible influences between components of victim system. The third and final step of proposed response strategy should make valuable direct (automated) or indirect (not automated) response by sending advising message to system administrator or by charging mobile agents by appropriate remedies and correctives.