Filters








51,196 Hits in 6.3 sec

A Multi-agents System for Network Security Management [chapter]

K. Boudaoud, Zahia Guessoum
2000 Telecommunication Network Intelligence  
The openness of business toward telecommunication networks in general and Internet in particular is performed at the prize of high security risks.  ...  Some drawbacks of existing systems reveal the necessity of designing a new generation of selfadaptive systems.  ...  These functions concern the detection of complex attacks happening in a high level. Thus, an agent having this role, will have a global view of the network and will detect coordinated attacks.  ... 
doi:10.1007/978-0-387-35522-1_23 dblp:conf/smartnet/BoudaoudG00 fatcat:3o7dpsawjvdrdmj2uvabtxtw24

Policy-driven Model for Security Management [chapter]

K. Boudaoud, C. McCathieNevile
2003 IFIP Advances in Information and Communication Technology  
The focus of our work concerns one critical security management issue that is intrusion detection.  ...  Of particular importance, then is the ability to rapidly apply new security policies in a system. Equally, a system should incorporate as much "intelligence" and reactivity in the system as possible.  ...  Therefore, in order to provide security solution for current networks as weil as for the next generation, we apply the MAS paradigm to the area of security and propose a new generation of security management  ... 
doi:10.1007/978-0-387-35620-4_36 fatcat:arcxaihv7vhfleqy5j4f5h24si

Analysis of adversarial attacks against CNN-based image forgery detectors [article]

Diego Gragnaniello, Francesco Marra, Giovanni Poggi, Luisa Verdoliva
2018 arXiv   pre-print
In this paper we analyze the vulnerability of CNN-based image forensics methods to adversarial attacks, considering several detectors and several types of attack, and testing performance on a wide range  ...  Currently, due to the success of deep learning in many multimedia processing tasks, there is high interest towards CNN-based detectors, and early results are already very promising.  ...  [16] generative adversarial networks have gained a major role in deep learning, providing remarkable results in a large number of tasks involving image synthesis and/or manipulation.  ... 
arXiv:1808.08426v1 fatcat:fo7nn4j5ereknh46po2tfre7gu

Can Predictive Filters Detect Gradually Ramping False Data Injection Attacks Against PMUs? [article]

Zhigang Chu and Andrea Pinceti and Reetam Sen Biswas and Oliver Kosut and Anamitra Pal and Lalitha Sankar
2019 arXiv   pre-print
However, an attacker can gradually increase the magnitude of the attack to avoid detection, and still cause damage to the system.  ...  In this paper, it is shown that if an attack is suddenly injected into the system, a predictive filter with sufficient accuracy is able to detect it.  ...  Since PMUs can directly measure the bus voltage phasor with high sampling rate and accuracy, they have the potential to play a significant role in real-time power system state estimation (SE) [1] dynamic  ... 
arXiv:1905.02271v1 fatcat:ojsv24yo3zbz3gs5yktn7tu3vy

Methodology for Efficient CNN Architectures in Profiling Attacks

Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
2019 Transactions on Cryptographic Hardware and Embedded Systems  
The side-channel community recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems.  ...  Compared with template attacks, deep learning techniques can deal with trace misalignment and the high dimensionality of the data. Pre-processing is no longer mandatory.  ...  We would also like to thank BenoÃőt GÃľrard and the anonymous reviewers for their valuable comments which helped to improve this work.  ... 
doi:10.13154/tches.v2020.i1.1-36 dblp:journals/tches/ZaidBHV20 fatcat:cuar5pdkrvhwvmzntzxq5c3gum

A Real-time LAN/WAN and Web Attack Prediction Framework Using Hybrid Machine Learning Model

Mohammad Arshad, Md. Ali Hussain
2018 International Journal of Engineering & Technology  
In this model, different types of attacks are detected and labelled prior to train the machine learning model.  ...  Web intrusion detection is also one of the major threat to real-time web applications due to unauthorized user's request to web server and online databases.  ...  Various researchers wanted to introduce a new approach which will integrate the basic concepts of both approaches in order to generate a very high and optimized performance intrusion identification system  ... 
doi:10.14419/ijet.v7i3.12.17774 fatcat:h5vgl3udkvhkba543bziav56yq

Counter-forensics in machine learning based forgery detection

Francesco Marra, Giovanni Poggi, Fabio Roli, Carlo Sansone, Luisa Verdoliva, Adnan M. Alattar, Nasir D. Memon, Chad D. Heitzenrater
2015 Media Watermarking, Security, and Forensics 2015  
For this reason, most modern techniques for forgery detection rely on the statistical distribution of micro-patterns, enhanced through high-level filtering, and summarized in some image descriptor used  ...  Then, we investigate on the effectiveness of the proposed strategy as a function of the level of knowledge on the forgery detection algorithm.  ...  the target pixels and working on a pre-filtered high-pass version of the image.  ... 
doi:10.1117/12.2182173 dblp:conf/mediaforensics/MarraPRSV15 fatcat:awvevh5xtfdq3grjxnsr24glh4

Distributed intrusion detection system using self organizing map

L. Vokorokos, A. Balaz, J. Trelova
2012 2012 IEEE 16th International Conference on Intelligent Engineering Systems (INES)  
The goal of the article is to presents intrusion detections systems and design architecture of intrusion detection based on neural network self organizing map.  ...  In the report is described base problematic of neural network and intrusion detection system.  ...  The role of the agent is to monitor and filter all activities within the protected area and depending on the approach adopted make an initial analysis and even undertake a response action.  ... 
doi:10.1109/ines.2012.6249817 fatcat:i5qordx7gjaf7i7atmaaftjfve

Attack Detection of Cyber-Physical Systems Based on Frequency Domain Partition

Cao-Yuan Gu, Jun-Wei Zhu, Wen-An Zhang, Li Yu
2020 IET Control Theory & Applications  
The frequency domain is divided into three frequency domains of low, medium and high, multiple AD filters are designed to work simultaneously.  ...  Finally, the experimental results of networked motion control system are given to verify the effectiveness and superiority of proposed method.  ...  Remark 1: In the existing literature, most think that the sensor end of the system is attacked, so the problems considered are general.  ... 
doi:10.1049/iet-cta.2019.1140 fatcat:ep3iwndhsvcbvplbdaao75q3ce

A hybrid feature-selection approach for finding the digital evidence of web application attacks

2019 Turkish Journal of Electrical Engineering and Computer Sciences  
The most critical challenge of web attack forensic investigations is the sheer amount of data and level of complexity.  ...  In this study, a hybrid approach that selects the relevant web attack features by combining the filter and wrapper methods is proposed.  ...  The new string attribute was split into characters with the frequency of occurrence as a value for each character and, as a result, new numeric attributes were generated.  ... 
doi:10.3906/elk-1812-18 fatcat:grlhws6xf5fwlkfz43bw7yry7e

Adversarial Attack Framework on Graph Embedding Models with Limited Knowledge [article]

Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Xin Wang, Wenwu Zhu, Junzhou Huang
2021 arXiv   pre-print
Without accessing any labels and model predictions, GF-Attack can perform the attack directly on the graph filter in a black-box fashion.  ...  To validate the generalization of GF-Attack, we construct the attacker on four popular graph embedding models.  ...  by GF-Attack indicates the graph filter order K in general attack loss.  ... 
arXiv:2105.12419v1 fatcat:x4yu7x57wfeang3emyndothree

Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling [article]

S. Hodžić, E. Pasalic, Y. Wei
2016 arXiv   pre-print
We also extend the framework of a generic cryptanalytic method called Generalized Filter State Guessing Attacks (GFSGA), introduced in [26] as a generalization of the FSGA method, by applying a variable  ...  We also demonstrate the possibility of employing GFSGA-like attacks to other design strategies such as NFSR-based ciphers (Grain family for instance) and filter generators outputting a single bit each  ...  Generalized inversion attacks [10] performed on filter generators, with the difference between the first and last tap position equal to M (= l n − l 1 ), have the complexity approximately 2 M [10] .  ... 
arXiv:1609.08422v1 fatcat:lnoxycm4fjc7na54yv3rrdpcli

Robustness and security assessment of image watermarking techniques by a stochastic approach

V. Conotter, G. Boato, C. Fontanari, F. G. B. De Natale, Jaakko T. Astola, Karen O. Egiazarian, Nasser M. Nasrabadi, Syed A. Rizvi
2009 Image Processing: Algorithms and Systems VII  
Security assessment is provided by a stochastic search of the minimum degradation that needs to be introduced in order to obtain an un-marked version of the image as close as possible to the given one.  ...  The proposed tool is based on genetic algorithms and is suitable for researchers to evaluate robustness performances of developed watermarking methods.  ...  It is based on genetic algorithms, which optimize the search of watermark parameters and order of attacks, depending on the application.  ... 
doi:10.1117/12.807357 dblp:conf/ipas/ConotterBFN09 fatcat:3d5rsl46xjabjmdqquxhstmqkm

A Survey of Machine Learning Techniques in Adversarial Image Forensics [article]

Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
2020 arXiv   pre-print
Therefore, with a focus on image forensics, this paper surveys techniques that can be used to enhance the robustness of machine learning-based binary manipulation detectors in various adversarial scenarios  ...  Image forensic plays a crucial role in both criminal investigations (e.g., dissemination of fake images to spread racial hate or false narratives about specific ethnicity groups) and civil litigation (  ...  Acknowledgements The first author thanks members of the Visual Information Processing and Protection (VIPP) group at the University of Siena, Italy for their suggestions.  ... 
arXiv:2010.09680v1 fatcat:qzvolq6kvrggfbyg23wrcnykza

Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection

Neminath Hubballi, Santosh Biswas, Sukumar Nandi
2010 2010 International Conference on Availability, Reliability and Security  
We assign an anomaly score to each bin based on the frequency of the individual gram in the bin and is termed as coverage of the bin.  ...  We evaluate the proposed scheme on normal traffic of DARPA 99 dataset mixed with a set of attacks. Experimental results shows the efficacy of the method with a false alarm rate as low as 0.001%.  ...  Although one can filter out known attacks from the training data and use it, but this do not filter the zero day attacks present in the dataset.  ... 
doi:10.1109/ares.2010.31 dblp:conf/IEEEares/HubballiBN10 fatcat:bblvbm4bmnhblffnb7leapijxq
« Previous Showing results 1 — 15 out of 51,196 results