Key-Reinstatement Storms on Kids, A Keyed Incongruity Detection System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Most incongruity detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Various Learning schemes have been proposed to overcome this weakness. One such system is KIDS (Keyed IDS), introduced at DIMVA’10. KIDS’ core idea is akin to the functioning of some cryptographic primitives, namely to introduce a secret element (the key) into the scheme. In KIDS the learned model and the computation of the incongruity score are both key-dependent, a fact which presumably prevents an attacker from creating evasion attacks. In this paper we show that recovering the key is extremely simple provided that the attacker can interact with KIDS and get feedback about probing requests.
Authors and Affiliations
K. Padmapriya, N. Rajendra, M. Komal Kumar
Automatic Pothole Detection System using Laser
Identification of pavement distress such as potholes and humps not only helps drivers to avoid accidents, but also helps authorities to maintain roads. This project discusses previous pothole detection methods that have...
Data mining in cloud computing
Data Mining is a process of extracting potentially useful information from raw Data, so as to improve the quality of the information service. With the rapid development of the Internet, the size of the data has increase...
Novel Switched-Capacitor Inverter Using Series/Parallel Conversion For 11-Level
In this paper Switched capacitor (SC) inverter is employed to amend high output voltage than the input voltage with minimal number of switches. A new series/parallel topology is proposed this require switches and capaci...
Automated Attendance Marking
The Internet of Things (IoT) is the network of physical objects — devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity — that enables these objects to colle...
Implement of Image Authentication by Encryption Procedure using LDPC Codes
In this paper, we prefer a way using encryption technique and LDPC origin coding for the image authentication complication. Image authentication is relevant in contented delivery via entrusted intermediaries, just for p...