2011 International Conference on Computational and Information Sciences 2011
DOI: 10.1109/iccis.2011.103
|View full text |Cite
|
Sign up to set email alerts
|

Backdoor Detection System Using Artificial Neural Network and Genetic Algorithm

Abstract: In this paper, we consider the issue of detecting a missing member of malicious codes named backdoors. We developed a novel approach for revealing them based on two clustered; system behavior and network traffic. Backdoors can easily be installed on the victim system aiming its exploit; detecting them requires considerable policies. Using Artificial Intelligence (AI) has revolutionized all security providing systems. Hence, our proposed method acquired a tunable idea using Artificial Neural Network (ANN) for c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Then, we construct software modules that encapsulate all attack components (poisoning and victim branches) inside a single process. Malicious functionality concealed in transient execution mode can remain unnoticed in software even after undergoing rigorous security checks such as symbolic execution [13], taint analysis [20], model checking [27], various methods to detect traditional software backdoors [59,60,63,66,71], and even existing Spectre detection tools [3,5,33,70]. According to recently proposed transient attack classification by Canella et al [15], transient trojans described in this paper present a practical example of the same address space transient execution attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Then, we construct software modules that encapsulate all attack components (poisoning and victim branches) inside a single process. Malicious functionality concealed in transient execution mode can remain unnoticed in software even after undergoing rigorous security checks such as symbolic execution [13], taint analysis [20], model checking [27], various methods to detect traditional software backdoors [59,60,63,66,71], and even existing Spectre detection tools [3,5,33,70]. According to recently proposed transient attack classification by Canella et al [15], transient trojans described in this paper present a practical example of the same address space transient execution attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Backdoors can easily be installed on a victim system that they aim to its exploit, thus detecting them requires considerable policies. A basic principle for backdoor detection is to find distinctive features of the activity of interest [22]. Table 1 shows possible detour attacks, and Figure 2 shows the possible detoured path of attacks described in Table 1.…”
Section: Fig 1 Traditional Layered Security System For Web Servermentioning
confidence: 99%
“…A typical backdoor attack contaminates a small amount of samples into the training dataset, so that the resulting model will mis-classify any sample containing an attacker-designed trigger. Note that if a trigger is successfully injected into a DNN, the trigger-containing samples are either clustered in specific areas in the input space, or clustered in the latent space of the DNN ( [15]). To detect a potential trigger x in a given DNN, one approach is to study the data points around x in the input space or in the latent space.…”
Section: Introductionmentioning
confidence: 99%