Key-Reinstatement Storms on Kids, A Keyed Incongruity Detection System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Most incongruity detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Various Learning schemes have been proposed to overcome this weakness. One such system is KIDS (Keyed IDS), introduced at DIMVA’10. KIDS’ core idea is akin to the functioning of some cryptographic primitives, namely to introduce a secret element (the key) into the scheme. In KIDS the learned model and the computation of the incongruity score are both key-dependent, a fact which presumably prevents an attacker from creating evasion attacks. In this paper we show that recovering the key is extremely simple provided that the attacker can interact with KIDS and get feedback about probing requests.
Authors and Affiliations
K. Padmapriya, N. Rajendra, M. Komal Kumar
slugFuzzy Base Enhanced LEACH IN WSN
Wireless sensor networks (WSN) are highly distributed networks of autonomous small, lightweight sensors (nodes) in large numbers to monitor physical or environmental conditions by the measurement of, temperature, vibrat...
An Efficient System to Access Network Using Time Based Scheduling and Automatic Database Creation Using Data Perturbation
With the wide deployment of public cloud computing infrastructures the time constrain based system is required. Using clouds to host data query services has become an appealing solution for the advantages on scalability...
Adaptive Fast Exemplar-Based Image Inpainting For Object Removal using Nelder-Mead simplex Algorithm
Image inpainting is the prime important technique used for removing defect from paintings and photographs. The challenge for the inpainting is to fill in the hole that is left behind in a visually plausible way so that...
A novel adaptive routing algorithm for Wireless adhoc network
Wireless AD-HOC Network is the most frequently used network these days. The traditional routing involves a fixed path for the routing process. It consists of a centralized system. The packets are forwarded from the sour...
Factors Affecting Stability and Quality of the Power System with Its Compensation Techniques In Brief
The purpose of this paper is to provide the practical information about the factors responsible for affecting power system stability and power quality. Some compensation techniques are also discussed to improve the beha...