Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions.
Marc StevensDaniel ShumowPublished in: USENIX Security Symposium (2017)
Keyphrases
- attack detection
- normal traffic
- network attacks
- countermeasures
- malicious users
- anomaly detection
- attack scenarios
- misuse detection
- distributed denial of service attacks
- detection mechanism
- object detection
- malicious attacks
- intrusion detection
- network security
- intrusion detection system
- cyber attacks
- injection attacks
- power analysis
- network intrusions
- sufficient conditions
- network traffic
- network intrusion detection
- dos attacks
- differential power analysis
- false positives
- detect malicious
- malicious traffic
- denial of service attacks
- data corruption
- detection method
- security measures
- collision avoidance
- security risks
- attack graphs
- detecting malicious
- network intrusion
- digital watermark