2006
DOI: 10.1007/11856214_4
|View full text |Cite
|
Sign up to set email alerts
|

Allergy Attack Against Automatic Signature Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 56 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…Venkataraman et al also present lower bounds for learning worm signatures based on red herring attacks [63]. Chung and Mok also developed allergy attacks against the Autograph worm signature generation system [12,13]. Autograph operates in two phases.…”
Section: Causative Attacksmentioning
confidence: 99%
“…Venkataraman et al also present lower bounds for learning worm signatures based on red herring attacks [63]. Chung and Mok also developed allergy attacks against the Autograph worm signature generation system [12,13]. Autograph operates in two phases.…”
Section: Causative Attacksmentioning
confidence: 99%
“…Using the framework presented in Section 2.3, we have demonstrated the effectiveness of Causative attacks against SpamBayes if the adversary is given realistic control over the training process of SpamBayes, by limiting the header fields the attacker can modify and the amount of control over the training set. Our Usenet-25k dictionary attack causes misclassification of 19% of ham messages with only 1% control over the training messages 3 , rendering SpamBayes unusable. Our focused attack changes the classification of the target message virtually 100% of the time with knowledge of only 30% of the target's tokens.…”
Section: Resultsmentioning
confidence: 99%
“…Chung and Mok [3,4] present a Causative Availability attack against the Autograph worm signature generation system [11], which infers blocking rules from the traffic of suspicious nodes. The main idea is that the attack node first sends traffic that causes Autograph to mark it suspicious, then sends traffic similar to legitimate traffic, resulting in rules that cause denial of service.…”
Section: Related Workmentioning
confidence: 99%
“…Tools such as Polygraph [28] and Hamsa [24] are used to create attack signature automatically. Attack against automatic signature generator have been studied in [8]. Some of NetAnalyzer signatures are taken from the Nmap [14], and L7 filter [35] databases.…”
Section: Introductionmentioning
confidence: 99%