Backtracking Algorithmic Complexity Attacks against a NIDS.
Randy SmithCristian EstanSomesh JhaPublished in: ACSAC (2006)
Keyphrases
- constraint satisfaction
- intrusion detection system
- attack detection
- network traffic
- countermeasures
- search algorithm
- watermarking scheme
- traffic analysis
- search tree
- security protocols
- terrorist attacks
- malicious attacks
- security mechanisms
- cryptographic protocols
- constraint propagation
- search space
- malicious users
- chosen plaintext
- computer security
- neural network
- tree search
- data publishing
- variable ordering
- watermarking method
- security risks
- dependency directed backtracking