Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System Most anomaly detection systems rely on machine learning algorithms to derive a model of normality that is later used to detect suspicious events. Some works conducted over the last years have pointed out that such algorithms are generally susceptible to deception, notably in the form of attacks carefully constructed to evade detection. Various learning schemes have been proposed to overcome this weakness. Core idea is akin to the functioning of some cryptographic primitives, namely to introduce a secret element (the key)…

Read More