Key-Reinstatement Storms on Kids, A Keyed Incongruity Detection System

Abstract

Most incongruity detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Various Learning schemes have been proposed to overcome this weakness. One such system is KIDS (Keyed IDS), introduced at DIMVA’10. KIDS’ core idea is akin to the functioning of some cryptographic primitives, namely to introduce a secret element (the key) into the scheme. In KIDS the learned model and the computation of the incongruity score are both key-dependent, a fact which presumably prevents an attacker from creating evasion attacks. In this paper we show that recovering the key is extremely simple provided that the attacker can interact with KIDS and get feedback about probing requests.

Authors and Affiliations

K. Padmapriya, N. Rajendra, M. Komal Kumar

Keywords

Related Articles

Automatic Pothole Detection System using Laser

Identification of pavement distress such as potholes and humps not only helps drivers to avoid accidents, but also helps authorities to maintain roads. This project discusses previous pothole detection methods that have...

Data mining in cloud computing

Data Mining is a process of extracting potentially useful information from raw Data, so as to improve the quality of the information service. With the rapid development of the Internet, the size of the data has increase...

Novel Switched-Capacitor Inverter Using Series/Parallel Conversion For 11-Level

In this paper Switched capacitor (SC) inverter is employed to amend high output voltage than the input voltage with minimal number of switches. A new series/parallel topology is proposed this require switches and capaci...

Automated Attendance Marking

The Internet of Things (IoT) is the network of physical objects — devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity — that enables these objects to colle...

Implement of Image Authentication by Encryption Procedure using LDPC Codes

In this paper, we prefer a way using encryption technique and LDPC origin coding for the image authentication complication. Image authentication is relevant in contented delivery via entrusted intermediaries, just for p...

Download PDF file
  • EP ID EP23902
  • DOI http://doi.org/10.22214/ijraset.2017.4196
  • Views 258
  • Downloads 8

How To Cite

K. Padmapriya, N. Rajendra, M. Komal Kumar (2017). Key-Reinstatement Storms on Kids, A Keyed Incongruity Detection System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(4), -. https://europub.co.uk/articles/-A-23902