@article{MAKHILLAJIT20111055675, title = {Intrusion Response Systems: An Overview}, journal = {Asian Journal of Information Technology}, volume = {10}, number = {5}, pages = {192-200}, year = {2011}, issn = {1682-3915}, doi = {ajit.2011.192.200}, url = {https://makhillpublications.co/view-article.php?issn=1682-3915&doi=ajit.2011.192.200}, author = {Gbolahan,Oluwatoyin and}, keywords = {Detection,response,threats,security,misuse,snort,access control,generic authorization}, abstract = {Intrusion detection and response to attack became a serious concern to researchers and network administrators as network attacks increases by the day. Several propositions and attempts are being developed to detect and respond to these attacks. This study presents an overview of some proposed intrusion response systems. Intrusion response systems were presented based on their methods of decisional analysis of intrusions detected by intrusion detection systems. Also, their methods of response reporting and limitations of each method were discussed.} }