2019
DOI: 10.3390/e21121196
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Using Kolmogorov Complexity in Cybersecurity

Abstract: Security and privacy concerns are challenging the way users interact with devices. The number of devices connected to a home or enterprise network increases every day. Nowadays, the security of information systems is relevant as user information is constantly being shared and moving in the cloud; however, there are still many problems such as, unsecured web interfaces, weak authentication, insecure networks, lack of encryption, among others, that make services insecure. The software implementations that are cu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 74 publications
0
5
0
Order By: Relevance
“…The use of all training data, following the approach in [ 58 ], could further improve the results here presented. Moreover, additional efforts are required to test the suitability of our methodology in multiclass classification problems in cybersecurity (as those in [ 59 , 60 ]).…”
Section: Discussionmentioning
confidence: 99%
“…The use of all training data, following the approach in [ 58 ], could further improve the results here presented. Moreover, additional efforts are required to test the suitability of our methodology in multiclass classification problems in cybersecurity (as those in [ 59 , 60 ]).…”
Section: Discussionmentioning
confidence: 99%
“…Besides those previously mentioned topics, other research directions to enhance cybersecurity were also paid attention. For instance, in [78] the authors conducted a survey about the use of Kolmogorov complexity in the security and privacy domains. The adoption of these technologies in the cybersecurity realm was inspired by the feature free nature, and the absence of a need to tune the parameters.…”
Section: Discussionmentioning
confidence: 99%
“…The literature provides several examples of the computation of complexity (or entropy) profiles or equivalent approaches for many applications [ 17 , 18 ]. For example, in the area of computational security [ 19 ], these profiles have been used for mimicking antiviruses [ 20 ] and detecting malware [ 21 ]. Although there has been success in the application of other distinct areas—namely, with the classification of galaxy clusters [ 22 ] and finding characteristic fingerprints in lithium-ion cells [ 23 ]—the use of these profiles has been widely applied to biological sequence analysis [ 24–26 ].…”
Section: Introductionmentioning
confidence: 99%