23,094 Hits in 6.6 sec

A Survey on Phishing Attacks

Krutika RaniSahu, Jigyasu Dubey
2014 International Journal of Computer Applications  
In this paper we make a survey about various attacks and their problems and establish a problem statement for finding the optimum solution for the problem arises.  ...  A secure and efficient technique is required to detect and prevent the attacks over the network transaction.  ...  Machine Learning Algorithm: this solution work on prediction, based on known properties learned from the training data set. As we discuss, all techniques involved in prevention of phishing attack.  ... 
doi:10.5120/15392-4007 fatcat:tfo3yztgkfawtlw2hwf3bf5w4i

Microarchitectural Attacks in Heterogeneous Systems: A Survey

Hoda Naghibijouybari, Esmaeil Mohammadian Koruyeh, Nael Abu-Ghazaleh
2022 ACM Computing Surveys  
In this survey article, we consider the security of heterogeneous systems against microarchitectural attacks, with a focus on covert- and side-channel attacks, as well as fault injection attacks.  ...  With the increasing proliferation of hardware accelerators and the predicted continued increase in the heterogeneity of future computing systems, it is necessary to understand the security properties of  ...  Then they utilize machine learning approaches to identify the victim's GPU workload among a small set of several entertainment and deep learning workloads. Side Channel Defenses on Discrete GPUs.  ... 
doi:10.1145/3544102 fatcat:dm3l4etg5vealdqyodhuopjhgy

The Threat of Adversarial Attacks on Machine Learning in Network Security – A Survey [article]

Olakunle Ibitoye, Rana Abou-Khamis, Ashraf Matrawy, M. Omair Shafiq
2020 arXiv   pre-print
In this survey, we first provide a taxonomy of machine learning techniques, styles, and algorithms. We then introduce a classification of machine learning in network security applications.  ...  However, applications of machine learning in network security face more disproportionate threat of active adversarial attacks compared to other domains.  ...  . • Deep Learning Techniques for Side-Channel Analysis Prouff et al.  ... 
arXiv:1911.02621v2 fatcat:p7mgj65wavee3op6as5lufwj3q

De-anonymisation attacks on Tor: A Survey

Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay K. Jha
2021 IEEE Communications Surveys and Tutorials  
In this survey paper, we review known Tor attacks and identify current techniques for the de-anonymisation of Tor users and hidden services.  ...  We discuss these techniques and analyse the practicality of their execution method.  ...  side-channel attacks.  ... 
doi:10.1109/comst.2021.3093615 fatcat:fjc3r2672bbz3m4rtdiweurmby

Physical Side-Channel Attacks on Embedded Neural Networks: A Survey

Maria Méndez Real, Rubén Salvador
2021 Applied Sciences  
In particular, embedded DNN implementations are vulnerable to Side-Channel Analysis (SCA) attacks, which are especially important in the IoT and edge computing contexts where an attacker can usually gain  ...  Without a complete review of this emerging field in the literature so far, this paper surveys state-of-the-art physical SCA attacks relative to the implementation of embedded DNNs on micro-controllers  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/app11156790 fatcat:h6ucd5p5yrgbnbrco2t2o3s2rm

Attacking Image Watermarking and Steganography - A Survey

Osama Hosam
2019 International Journal of Information Technology and Computer Science  
Data hiding is essential in many applications such as communication channel security, data security and forgery detection. Watermarking is used in copyright protection.  ...  Image hiding attacks can be active or passive. In active attack, the attacker changes the content of the data. While in passive attacks the attacker tries to guess the secure data by eavesdropping.  ...  A comprehensive survey on watermarking security is introduced in [53] , year 2006. The authors covered the theoretical side of watermarking security.  ... 
doi:10.5815/ijitcs.2019.03.03 fatcat:bjbiaqox6jeupiuui33ej2luay

Anonymity with Tor: A Survey on Tor Attacks [article]

Ishan Karunanayake, Nadeem Ahmed, Robert Malaney, Rafiqul Islam, Sanjay Jha
2020 arXiv   pre-print
In this paper, we survey known Tor attacks and identify currently available techniques that lead to improved de-anonymisation of users and hidden services.  ...  As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship  ...  Their work focuses on how machine learning techniques have been applied to such classifications and compares those techniques.  ... 
arXiv:2009.13018v2 fatcat:eaijzylajvfxxluoueu3yf66mu

Ransomware Attack and Remedial: A Survey

L.A. Kong, K.N. Yeo, R.X. Ng, S.H. Kok
2020 International Journal of Innovative Research in Applied Sciences and Engineering  
However, most of the method that mention above are the general way to prevent the system from ransomware. In this report, we will discuss in more detail about the latest ransomware attacks.  ...  Ransomware is a type of malware that deny user access to its own system and demands payment before the system is restored.  ...  Many researcher are using machine learning algorithm in IDS for detection of unknown ransomware [28] . 4. Incident Response: a. Setting-Up an Incident Response Plan.  ... 
doi:10.29027/ijirase.v3.i7.2020.490-497 fatcat:he45gfcyh5ad3mu2ahnnnwa5vi

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou
2017 Electronics  
Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access  ...  The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can  ...  Fournaris conceived and structured the paper's concept, did the overview on cache35 attacks, side channel attacks and countermeasures and contributed to the survey research of the rowhammer microarchitectural  ... 
doi:10.3390/electronics6030052 fatcat:7twtik7awjdcrk62xzbaqkaq4y

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography [article]

Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang
2021 arXiv   pre-print
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems.  ...  In this paper, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications.  ...  This paper provides a comprehensive survey of microarchitectural side-channel attacks and defenses in cryptographic applications.  ... 
arXiv:2103.14244v1 fatcat:u35eyivqbngplfa4qrswfsqqti

A Survey on Cloud Attack Detection using Machine Learning Techniques

Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkarvarthy
2020 International Journal of Computer Applications  
This survey provides a comprehensive study of cloud security concerns, traditional security measures, and machine learning-based security solutions in the cloud environment.  ...  The deep learning is a branch of machine learning that provides remarkable performance in cloud security issues.  ...  The different kinds of attacks exist in the cloud [18, 19] , including the Distributed Denial of Service (DDoS) Attack [20] , malware injection attack, side-channel attack, Man-in-the-Middle (MITM) attack  ... 
doi:10.5120/ijca2020920887 fatcat:5kk66mrxcffhnajfovglapfasu

Semantics-aware detection of targeted attacks: a survey

Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser
2016 Journal in Computer Virology and Hacking Techniques  
To overcome these obstacles, we present a structured review of semantics-aware works that have a high potential for contributing to the analysis or detection of targeted attacks.  ...  In today's interconnected digital world, targeted attacks have become a serious threat to conventional computer systems and critical infrastructure alike.  ...  Pölten -University of Applied Sciences.  ... 
doi:10.1007/s11416-016-0273-3 fatcat:flhbpc4uwbandby2adxi62t64u

Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

Linyuan Zhang, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, Jinlong Wang
2015 IEEE Communications Surveys and Tutorials  
In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs.  ...  Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks.  ...  helped us improved the quality of this paper significantly.  ... 
doi:10.1109/comst.2015.2422735 fatcat:dc3yq7dparbapht5nswwhhmzr4

A Survey on Split Manufacturing: Attacks, Defenses, and Challenges [article]

Tiago D. Perez, Samuel Pagliarini
2020 arXiv   pre-print
In our survey, we present a detailed overview of the technique, the many types of attacks towards Split Manufacturing, as well as possible defense techniques described in the literature.  ...  In order to overcome security concerns associated with the outsorcing of IC fabrication, the Split Manufacturing technique was proposed.  ...  A Machine Learning (ML) framework was used by Zhang et al. [20] in an attempt to improve the attack proposed in [18] . The same setup as previously discussed was utilized.  ... 
arXiv:2006.04627v2 fatcat:ie6b22vw25d35brv24ue7vlodq

Survey of Attacks and Defenses on Edge-Deployed Neural Networks [article]

Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy
2019 arXiv   pre-print
In this work, we cover the landscape of attacks on, and defenses, of neural networks deployed in edge devices and provide a taxonomy of attacks and defenses targeting edge DNNs.  ...  While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges.  ...  In order to violate the integrity of a machine learning model, attackers may attempt to find adversarial examples [35] .  ... 
arXiv:1911.11932v1 fatcat:zihiqvq2tbd3zpuyvwqrrf5itq
« Previous Showing results 1 — 15 out of 23,094 results