Exploring data leakage in encrypted payload using supervised machine learning

作者: Amir Khaleghi moghaddam , Nur Zincir-Heywood

DOI: 10.1145/3407023.3409216

关键词: Key (cryptography)Computer scienceData securityLeakage (electronics)EncryptionMachine learningKey managementArtificial intelligenceSupervised learningPayload (computing)

摘要: Data security includes but not limited to, data encryption and key management practices that protect across all applications platforms. In this paper, we aim to explore whether any leakage takes place in when encrypted is analyzed using supervised machine learning techniques. To end, analyze four algorithms with different sizes five techniques on two datasets. The results show as the get stronger, decreases, even though never zero percent.

参考文章(30)
David Martin Ward Powers, None, Evaluation: from Precision, Recall and F-measure to ROC, Informedness, Markedness and Correlation arXiv: Learning. ,vol. 2, pp. 37- 63 ,(2011)
Yiming Yang, Bryan Klimt, Introducing the Enron Corpus. conference on email and anti-spam. ,(2004)
Matthew Wiener, Andy Liaw, Classification and Regression by randomForest ,(2007)
Harry Zhang, The Optimality of Naive Bayes. the florida ai research society. pp. 562- 567 ,(2004)
Hamid A. Jalab, Yahya Al-Nabhani, Hamdan O. Alanazi, M. Shabbir, A. A. Zaidan, B. B. Zaidan, New Comparative Study Between DES, 3DES and AES within Nine Factors arXiv: Cryptography and Security. ,(2010)
Mitsuru Matsui, Linear cryptanalysis method for DES cipher theory and application of cryptographic techniques. pp. 386- 397 ,(1994) , 10.1007/3-540-48285-7_33
Grigori Sidorov, Francisco Velasquez, Efstathios Stamatatos, Alexander Gelbukh, Liliana Chanona-Hernández, Syntactic N-grams as machine learning features for natural language processing Expert Systems With Applications. ,vol. 41, pp. 853- 860 ,(2014) , 10.1016/J.ESWA.2013.08.015
Ashwak Mahmood Alabaichi, Ramlan Mahmood, Faudziah Ahmad, Mohammed S. Mechee, Randomness analysis on blowfish block cipher using ECB and CBC modes Journal of Applied Sciences. ,vol. 13, pp. 768- 789 ,(2013) , 10.3923/JAS.2013.768.789
D. Coppersmith, The Data Encryption Standard (DES) and its strength against attacks IBM Journal of Research and Development. ,vol. 38, pp. 243- 250 ,(1994) , 10.1147/RD.383.0243
Sepp Hochreiter, Jürgen Schmidhuber, Long short-term memory Neural Computation. ,vol. 9, pp. 1735- 1780 ,(1997) , 10.1162/NECO.1997.9.8.1735