Downloads: 124 | Views: 227
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 12, December 2015 | Rating: 6.6 / 10
Survey on Keyed IDS and Key Recovery Attacks
Vina M. Lomte [11] | Dipali Patil
Abstract: With the anomaly detection systems, many approaches and techniques have been developed to track novel attacks on the systems. Anomaly detection systems based on predefine rules and algorithms, its difficult to define all rules. To overcome this problem various machine learning schemes have been introduced. One such scheme is KIDS (Keyed Intrusion Detection System) which is completely depend on secrecy of key and method used to generate the key. In this scheme, attacker easily able to recover key by interacting with the KIDS and observing the outcome from it. Using this scheme one cannot able to meet security standards. So based on survey we need the scheme which will help us to provide more security on cloud storage and for personal computer. We are going to proposed scheme for more security which will be used to secure sensitive data of various domains like in healthcare domain patient related data like contact details and history.
Keywords: Anomaly detection systems, Keyed Intrusion Detection System, Adversarial Learning, Feature Selection, Classifier Security, Evasion Attacks, machine learning
Edition: Volume 4 Issue 12, December 2015,
Pages: 846 - 849