Abstract
Intrusion Detection System (IDS) detects the intrusions and produces alerts. Automated Intrusion Response System (AIRS) selects and triggers the appropriate response based on some criteria to mitigate the intrusion without delay. The big challenges in the automated response selection process are a precise measurement of importance weight for each criterion and response prioritization for the specific category of attacks. Analytic hierarchy process (AHP) uses the pair-wise comparison of each criterion and does not require the accurate quantification but is unable to handle the vagueness or uncertainty in the importance judgment. This paper presents the framework called Fuzzy Rule-Based Automatic Intrusion Response Selection System (FRAIRSS) for automated response selection. Fuzzy AHP model has been created in order to deal with precise measurement and uncertainty in the importance judgment of each criterion. Fuzzy TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) multi-criteria decision making (MCDM) approach has been applied in order to resolve the response prioritization. Fuzzy Rule-based inference system is modeled to select the appropriate response from the prioritized response sets for each category of attacks. The framework has been simulated in MATLAB with various attack scenarios and it is found that FRAIRSS is selecting most appropriate response under the given attack scenarios.
Keywords
Introduction
The dependence on the network and internet services are increasing very fast and so the threat of intrusion. According to PWC Global State of Information Security Survey-2016 [1], the intrusion incidents have increased by 38% compared to the previous year. The constant increasing incidents required a powerful defense mechanism in order to overcome the organization loss.
There are the tools available for monitoring the intrusion on the system called IDS that generates the alerts in case an intrusion is detected. It becomes very tedious for the network administrator to respond each alert without any delay, exclusively when the generated alerts are very large in numbers. So an AIRS is required to handle a large number of alerts and respond appropriately based on the response selection criteria, without much delay [2]. The goal of an AIRS is to select automatically the correct response to the alerts to mitigate the attack with less penalty cost [2].
Various frameworks and models have been proposed for the AIRS, which considered various response selection criteria. In this paper, four response selection criteria are identified and selected that are most frequently used by the various researchers of the domain.
One of the big obstacles is how to assign the accurate quantitative importance weight for each criterion in order to select an appropriate response. Under the literature survey, it is found that most of the AIRS models manually assigned the weight to each criterion without any further analysis. There should be some well-defined methods to overcome this problem.
Fuzzy AHP uses the linguistic terms for the pairwise comparison of each criterion by the multiple security expert participants and avoiding the need for accurate quantification as well as accommodating the level of decision maker’s uncertainty. Apart from this Fuzzy AHP (FAHP) also provides the method to analyze and ensure the consistency ratio and acceptance level of the pair-wise comparison from the domain experts. This paper presents the methods for measurement of the importance of each response selection criterion based on the Fuzzy AHP and also analyzes the consistency acceptance level of the assigned weight.
Another challenge under AIRS is the response prioritization based on the attack type. In order to deal with this problem, multi-criteria decision making (MCDM) approach has been used to model the problem. Although there are various MCDM methods are available such as AHP, SAW, and TOPSIS. In this paper, Fuzzy TOPSIS technique has been applied because of its capability of supporting the uncertainty due to fuzziness and its decision process considering the positive as well as negative ideal solutions in order to produce the final decision of prioritization [19, 20].
The major contribution of this work is to design the framework FRAIRSS comprising mainly three components: importance weight evaluation, response set prioritization and appropriate response selection.
The whole paper is organized as follows: Section II presents the related works. Section III presents the proposed framework. Section IV describes the response selection criteria. Section V presents the proposed method of Fuzzy AHP based measurement of the importance weight for each response selection criterion. Section VI describes the FRAIRSS Response set prioritization using Fuzzy TOPSIS. Section VII describes the FRAIRSS Fuzzy Inference Model. Section VIII presents the discussion over results and section IX gives the conclusion.
Related work
Intrusion response system
Aderonke Justina et al. [4], have presented the COSIRS (Cost-Sensitive Intrusion Response System) response cost assessment model by considering the three criteria: damage cost caused by the intrusion, response cost, and the operational cost [3]. This approach suffers from multiple limitations. First, they did not consider attack type. Response selection without considering the attack types may lead to inaccurate selection of response. For example, shutdown response might be best suited in the case of U2R (User to Root) attack but it may not be the best solution under the DOS (Denial of Service) attack if availability is in the highest priority of organization’s security policy. Secondly, criteria weights are assigned manually & response prioritization has not been evaluated.
Yu Sun et al. [5], proposed an Aggregation and Cost Based Automatic Intrusion Response System (ACAIRS) model. This approach is having the limitations of not considering the attack type and criteria weight.
Bingrui Foo et al. [6], presented an automated intrusion response mechanism called ADEPTS, based on the intrusion graph called I-GRAPH. Although this approach considered the attack types but there is no evaluation in terms of confidentiality, integrity, availability and criteria weight assignment.
Zheng Wu et al. [7], presented the response decision model based on a three layer Analytic Hierarchy Process (AHP). This approach considered the attack types as well as automated criteria weight assignment but not considered the security goals under the evaluation process and criteria weight assignment does not deal with the decision maker’s uncertainty or vagueness.
Chengpo Mu et al. [8, 9], have presented Intrusion Detection Alert Management and Intrusion Response System (IDAM&IRS) with the list of response factors such as attack related factors, response related factors and target related factors. This approach does not show any evaluation in terms of the criteria weight & response prioritization.
Wang Zeng-quan et al. [10], analyzed the various elements that are important for designing the adaptive response system. They presented the alarm matrix and analyzed the various criteria involved in the designing of IRS such as: analysis of IDS properties like attack & alarm frequency; analyzed the quality of IDS with five aspects: Detection preciseness frequency, failing frequency, distorting frequency, alarm reliability and IDS efficiency. Under the analysis process, criteria weight & security goals are not considered.
Alireza Shameli-Sendi et al. [16] have presented ORCEF (Online response cost evaluation framework) framework for cost-sensitive IRS. They have considered the various response selection criteria such as Positive confidentiality, positive integrity, negative network users etc. MCDM based model has been created using the SAW techniques for response prioritization. This approach suffers from multiple limitations. Firstly, no method is mentioned related to the criteria weight evaluation. Secondly, for response prioritization SAW (Simple Additive Weighting) MCDM technique is used. Although SAW calculation is very simple but the result obtained may not be logical [19].
Multi-criteria decision making (MCDM)
MCDM setting the priority to alternatives based on criteria determined by the experts. Widely used MCDM methods are AHP, SAW, ELECTRE, and TOPSIS. Simple Additive Weighting (SAW) calculation is very simple but estimates revealed do not always reflect the real situation; result obtained may not be logical [19], whereas Technique for Order Preferences by Similarity to Ideal Solutions (TOPSIS) has a simple process with easy to use and program characteristics. The number of steps remains the same regardless of the number of attributes [19, 20]. Since our goal is to produce the practical framework that can be easily implemented without having any dilemma of being diverted from the real and logical situations, the TOPSIS MCDM has been chosen as it best fit into the required goal of the framework. In order to deal with the expert’s opinion, in place of quantitative, qualitative measurement has been used in terms of the linguistic variables. To handle the uncertainty of the expert’s opinion measured in terms of linguistic variables, Fuzzy TOPSIS mechanisms has been chosen for modeling the proposed framework.
Contribution
Majority of the models uses a set of criteria, but only a few models consider the evaluation of the criteria weight automatically. Zheng Wu et al. [7] has proposed AHP based model for assigning the appropriate weight for each criterion which manages the accurate quantitative weight assignment but it cannot be able to deal with uncertainty of the decision makers [3]. In this paper, Fuzzy AHP has been applied for importance weight calculation of each criterion with the capability to deal with the uncertainty of the decision makers. This work is close to Alireza Shameli-Sendi et al. [16], but they used manual and static weight assignment to each criterion and did not present the technique for automated importance weight assignment. Their framework being very complex. The SAW technique used is very simple MCDM mechanism in itself but does not consider the Ideal situation in order to decide the prioritization and Estimates revealed do not always reflect the real situation; hence result obtained may not be logical [19]. As in most of the proposed frameworks of AIRS, it is found a need for the decision maker precise importance weights for each criterion assigned manually, that may comprise uncertainty, which may lead to inappropriate results. To overcome this problem, this work uses the hybrid approach for more consistent evaluation and prioritization of the intrusion response based on the criteria. Because of varied importance weight of the selected criteria, fuzzy AHP is able to handle the uncertainty and used to calculate the relative importance weight of each criterion. Afterward, by utilizing obtained importance weight of each criterion as an input to the fuzzy TOPSIS algorithms, the set of intrusion response alternatives are prioritized. The main contributions of the paper are to:
Design fuzzy AHP based automated importance weight assignment to each response selection criterion which not only deals with accurate quantitative weight assignment but also handles the decision maker’s vagueness or uncertainty. Design fuzzy TOPSIS MCDM based response prioritization for each response set under the classified attack type. Design fuzzy rule-based inference system for selecting the appropriate response from the prioritized response set for each attack type. Thereby designed inference system produces the selected response as an output based on the input called attack confidence level and target resource value.
Proposed framework
FRAIRSS architecture
IDS generates the alerts, which are categorized into four main attack types i.e. U2R (user to root attack), R2L (root to local attack), DOS (Denial of Service attack) and Probe attacks. Response pool has been created and categorized into the three response set based on the domain expert opinion and the literature survey i.e. U2R & R2L Response set, DOS response set and Probe response set. The architecture of the proposed framework FRAIRSS is presented in the Fig. 1.

FRAIRSS Architecture.
Step 1: Identify Response Pool.
Step 2: Classify the response pool into the response set based on the attack type on which they can be applied as shown in Table 1 with the following objectives:
In case of the U2R and R2L type of attack, since the system might be under the control of attacker, aim of selected response should be to increase the Confidentiality and Integrity of the system. In case of DOS attack, since an attacker may slow down the system, here the primary objective should be to increase the Availability of the system. In BROBE attack, the basic motto should be to increase the availability and confidentiality of the system.
Because response set for U2R and R2L attack types are having the same objective, so they grouped together. Table 1 representing the selected response set based on the mentioned attack types [7, 17].
Response Set Based on Attack Types
Response Set Based on Attack Types
Step 3: Classify the attack pool generated by IDS into four categories: U2R, R2L, DOS and PROBE attack.
Step 4: Identify the set of response selection criteria. Here, four criteria are identified: Confidentiality (C), Integrity (I), Availability (A) and Response Cost (RC).
Step 5: Specify the organization’s security policy in terms of CIA and response cost.
Step 6: Evaluate the weight of each criterion using fuzzy AHP considering the response selection.
Step 7: Evaluation of the response priority for each response set. Fuzzy TOPSIS has been used to set the priority of each response within the response set.
Step 8: Identifying the Target Value (TV) by expert opinion using linguistic variables such as low, medium, high etc.
Step 9: Identifying the attack confidence level (ACL). ACL can be inferred from the IDS and be represented in the form of linguistic variables.
Step 10: Designing the Fuzzy Rule-Based Inference Engine for each prioritized response set. It will take Target Value and attack confidence level as input and produce an optimal response that can be applied to the detected attack.
All the mentioned AIRS models possess their own set of response selection criteria and they do not show any uniformity. Four response selection criteria are identified that have been considered by the most of the AIRS models [7, 17]. Identified response selection criteria are:
1. Confidentiality (C): data must not be revealed to an unauthorized user. 2. Integrity (I): ensure the accuracy of data. 3. Availability (A): ensure the availability of resource or data to authorized user. 4. Response Cost (RC): Cost occurs in the system due to applied selected response and can figure out by the cost of various resources and services running in the targeted systems with the help of expert opinion using linguistic variables.
FAHP based measurement of importance weight for each criterion
Although AHP [11] avoids the accurate quantitative measurement of the importance weight of each criterion but cannot handle the uncertainty in the importance judgment. To handle this uncertainty we need the fuzzy set with AHP called FAHP. Here the triangular fuzzy numbers (TFNs) are used for representing the fuzzy relative importance of each criterion.
Triangular Fuzzy Number (TFNs)
TFN is represented by (l, m, u) with the membership function defined as [12, 13]:
Linguistic terms and equivalent TFNs
Steps for measurement of the importance weight of each criterion:
Comparison matrix (Based on the organization’s needs)
Comparison matrix (Based on the organization’s needs)
Calculated geometric mean and importance weight for each criterion
Non-fuzzy and normalized relative importance weight of each criterion
So, the obtained importance weight of criteria [C, I, A, RC] = [0.24, 0.64, 0.06, 0.06] It can be observed from the Table 5 that, the Integrity (I) criterion has scored the highest importance weight 64.18 and so be given the first priority. The second priority should be given to the Confidentiality (C), which scored the importance weight 23.95. Similarly, the other two criteria Response Cost (RC) and Availability (A) scored importance weight 6.08 and 5.79 respectively and ranked 3 rd and 4 th .
To verify consistency of the taken comparison matrix C to ensure a certain level of quality of decision, the consistency ratio (CR) has to be computed and checked if its value is less than 0.1. If CR ≤ 0.1 then we can consider that the evaluation is consistent [15].
FRAIRSS response set prioritization using fuzzy TOPSIS technique
Prioritization of response set for R2L and U2R attack
Linguistic variables and equivalent fuzzy numbers used for rating the positive and negative category of criteria are shown in Table 6. Response prioritization evaluation steps using Fuzzy TOPSIS [18]:
Evaluation criteria: C, I, A and RC Response alternatives for R2L & U2R attacks: SH (Shutdown Host), KP (Kill Process) and DU (Disable User)
Linguistic variables and fuzzy number for ratings the positive and negative category of criteria
Linguistic variables and fuzzy number for ratings the positive and negative category of criteria
Distance of each alternative from A* and A-
Step 8: Calculate
Closeness coefficient
Step 9: Based on the CC
i
of each alternative, rank the alternatives in descending order. Similarly, with the help of fuzzy decision matrix
CC i of alternatives for R2L & U2R attack types with its equivalent linguistic value of applied response level
CC i of alternatives for DOS attack type with its equivalent linguistic value of applied response level
CC i of alternatives for PROBE attack type with its equivalent linguistic value of applied response level
Linguistic variable and its Fuzzy equivalent for input variables
Linguistic variable and its Fuzzy equivalent for output variables
Fuzzy logic inference system [21] is very flexible in terms adaptability. Thus because of the use of fuzzy logic based system expensive and precise measurement is not required and measurements with low precision can be implemented, which will keep the overall system complexity low. Thus the use of fuzzy logic control makes the implementation of the system much more practical which is the number one goal of the proposed framework. Main reason for selecting the fuzzy rule-based inference system is:
It is very fast, easy to calculated, near optimum, intuitive, has widespread acceptance and well suited to human input
Design of fuzzy inference engine: FRAIRSS_R2L_U2R
Fuzzy Inference system called FRAIRSS_R2L_ U2R (Fuzzy Rule-Based Automatic Intrusion Response Selection System for R2L and U2R attack type) is designed to pick the most appropriate and suitable response from the prioritized response set under the given constraints and attack circumstances. FRAIRSS_R2L_U2R takes attack confidence level and attack target value as input and produces the level of response that can be appropriate to apply in the given attack circumstances. The input and output variables are assigned the fuzzy value in linguistic variable forms as mentioned in Tables 12 and 13 respectively. Mamdani fuzzy inference controller [22] is used for designing fuzzy inference system FRAIRSS_R2L_U2R as shown in Fig. 2, with the parameters as: centroid for defuzzyfication, IP/OP range [0, 10] and Min, Max for AND & OR operations. Mamdani’s method is one of the fuzzy inference system (FIS) built using fuzzy set theory that maps input space to an output space using fuzzy logic and used to solve the various decision problems.

FRAIRSS_R2L_U2R: Mamdani fuzzy inference controller for R2L and U2R attack based response selection.
The membership functions for the input variables AttackConfidenceLevel and TergetResourceValue and for output variable AppliedResponse are shown in Figs. 3, 4 and 5 respectively.

AttackConfidenceLevel Membership function.

TergetResourceValue Membership function.

AppliedResponse Membership function.
The rule base is a set of rules of the IF-THEN form. The IF portion of a rule refers to the degree of membership in one of the fuzzy sets. The THEN portion refers to the consequence, or the associated system output fuzzy set. Inference Rule Base of FRAIRSS_R2L_U2R for Response Selection given in Table 14.
Inference Rule Base of FRAIRSS_R2L_U2R for Response Selection
Inference Rule Base of FRAIRSS_R2L_U2R for Response Selection
Here each rule is having the equal weight. i. e. 1; ACL: AttackConfidenceLevel; TRV: TargetResourceValue; AR: AppliedResponse; l:Low; m:Medium; h:High; vh: veryhigh.
Similarly the fuzzy rule based inference system FRAIRSS_DOS and FRAIRSS_PROBE has been created for the response selection for DOS and PROBE attack types are mentioned in Tables 15 and 16 respectively and simulated in the MATLAB.
Inference rule base of FRAIRSS_DOS for response selection
Here each rule is having the equal weight. i. e. 1; ACL: AttackConfidenceLevel; TRV: TargetResourceValue; AR: AppliedResponse; l:Low; m:Medium; h:High; vh: veryhigh.
Inference Rule Base of FRAIRSS_PROBE for Response Selection
Here each rule is having the equal weight. i. e. 1; ACL: AttackConfidenceLevel; TRV: TargetResourceValue; AR: AppliedResponse; l:Low; m:Medium; h:High; vh: veryhigh.
Fuzzy logic toolbox in Matlab is used to simulate the designed fuzzy inference system. The defined fuzzy rules can be viewed graphically using rule viewer; for example the Fig. 6 represents the rules for FRAIRSS_R2L_U2R inference system, where the aggregate output is shown at the bottom and the defuzzified output is shown at the center of the area as a small vertical line. The surface view for the FRAIRSS_R2L_U2R inference system is shown in Fig. 7, represents the relationship between inputs and the output in terms of data distribution. Surface view depicts three dimensional surface for the output variable AppliedResponse with respect to the variations in two input variables AttackConfidenceLevel and TargetResourceValue respectively. The defuzzified value of input scenarios and selected defuzzified value of the output variable is shown in Table 17. The variation in the output variable will occur according to the rules defined for FRAIRSS_R2L_U2R, FRAIRSS_DOS and FRAIRSS_PROBE fuzzy rule base. As defined organization’s policy (Table 5) in terms of response selection criteria (C, I, A and RC), it is shown that the highest priority is given to the integrity and second highest priority to confidentiality. Availability and response cost have equal importance being in the third priority. In scenario number 1 (Table 17), defuzzified value of attack confidence level is 8.01 indicating the attack confidence level is high and match with the rule number 7, 8 and 9 in the defined rule base for FRAIRSS_R2L_U2R inference system (Table 14). Whereas, the target resource defuzzified value is 7.85, which match with the rule number 3, 6 and 9 of the defined rule base for FRAIRSS_R2L_U2R inference system. The FRAIRSS_R2L_U2R inference system produces defuzzified value 7.98 as an output, which indicates the applied response should be high. In the mentioned security policy and scenario number 1, where attack confidence level and target resource value both are high, the proposed system produces the response Shutdown Host (SH) as an output. Since, under security policy, highest priority is given to integrity and confidentiality as compare to availability with attack confidence level and target resource value both are also high, then the selected response Shutdown Host (SH) is best suited & appropriate response under this scenario. In the scenario number 7, the attack confidence level is low (defuzzified value 3 as shown in Table 17) and target resource value is high (defuzzified value 8 as shown in Table 17). So, under DOS attack type with the mentioned situation the inferred level of response from the proposed system is high i.e. the selected response is Reset Connection (RST) as shown in Table 10. Since the integrity and confidentiality are assigned the highest priority, although the attack confidence level is low but target resource value is high, so Reset Connection (RST) in this situation will be the best possible solution in terms of response selected.

FRAIRSS_R2L_U2R inference system rule view.

FRAIRSS_R2L_U2R inference system surface view.
Response selected in terms of output variable on various input scenario (defuzzified values)
Different output inferred by the proposed framework (containing FRAIRSS_R2L_ U2R, FRAIRSS_DOS and FRAIRSS_PROBE fuzzy inference systems) are shown in Fig. 8, indicating various responses selected under defined attack type (R2L/U2R, DOS and PROBE attacks), with the inputs as target resource value and the attack confidence level. It is shown clearly in the Fig. 8, that the response Shutdown Host (SH), which may produce high response cost, is selected by proposed framework only if attack confidence level as well as target resource value both are towards the higher end. Whereas, the response No Response (NR), having no response cost at all, is selected only if attack confidence level as well as target resource value both are towards the lower end. As seen, it is demonstrated how FRAIRSS framework can select appropriate response in different scenarios. Different scenarios with the attack types, attack confidence level, target resource value and organization’s security policy are evaluated, (out of which 10 scenarios are shown in the Table 17) and it is found that the proposed framework is producing the desired and optimal response that can be applied to given scenario in order to mitigate the intrusions.

Various responses selected.
The performance analysis of the proposed framework is evaluated based on Response Trigger Time (RTT). RTT is the total execution time required by the framework to select the appropriate response.
Response Trigger Time of the FRAIRSS framework
Response Trigger Time of the FRAIRSS framework
This paper presented the FRAIRSS framework which is very simple and practical model that can easily be implemented and used in real time. Fuzzy AHP handles the challenge of assigning the precise quantitative value as well as it also deals with the vagueness of the assigned importance weight of each criterion by the decision makers. The paper describes how Fuzzy AHP can be used for the measurement of importance weight of each response selection criterion.
The Importance weight of each criterion is further applied to the Fuzzy TOPSIS MCDM techniques for solving the issue of response set prioritization. Fuzzy rule-based inference system has been created for selecting the appropriate response from the prioritized response set based on the given input parameters i.e. attack confidence level and the target resource value. FRAIRSS framework is simulated in the MATLAB and it is found that the proposed framework is selecting the most desired and appropriate response for the given attack type and the input scenarios.
