A CRYPTOGRAPHIC PRIMITIVE TO PREVENT AN INVADER FROM CREATING DODGING ATTACKS

作者: Ch. China Subba Reddy , Nalla Bindu , T. Shesagiri

DOI:

关键词: Cryptographic primitiveComputer securityKey (cryptography)Payload (computing)Classification procedureAdversaryEngineeringRecognition systemFocus (computing)Evasion (network security)

摘要: Keyed invasion recognition method is a charge card applicatoin-layer network system of anomaly that extracts several features from all the payload. The essential idea to obstruct evasion attacks always are thought key, this like secret element which determines extraction classification within Our focus remains on recovering key completely through efficient procedures, demonstrating procedure leaks data regarding may be leveraged by means an opponent. Inside our work we evaluate strength Invasion Recognition System against key-recovery attacks. We describe end result particularly simple when as long attacker can talk and get feedback probing demands.

参考文章(4)
Michael E. Locasto, Angelos D. Keromytis, Salvatore Stolfo, Yingbo Song, Angelos Stavrou, On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusi Machine Learning. ,(2010)
Ke Wang, Gabriela Cretu, Salvatore J. Stolfo, Anomalous Payload-Based Worm Detection and Signature Generation Lecture Notes in Computer Science. pp. 227- 246 ,(2006) , 10.1007/11663812_12
Juan E. Tapiador, John A. Clark, Masquerade mimicry attack detection: A randomised approach Computers & Security. ,vol. 30, pp. 297- 310 ,(2011) , 10.1016/J.COSE.2011.05.004
Benjamin I. P. Rubinstein, Satish Rao, Blaine Nelson, Anthony D. Joseph, J. D. Tygar, Ling Huang, Steven J. Lee, Query strategies for evading convex-inducing classifiers Journal of Machine Learning Research. ,vol. 13, pp. 1293- 1332 ,(2012) , 10.5555/2188385.2343688