Response option for attacks detected by intrusion detection system | IEEE Conference Publication | IEEE Xplore