Attacked user image capturing in file transfer

      

ABSTARCT :

Now a days Attacker’s launch attack campaigns targeting the zero day vulnerability, compromising internet users on a large scale. The first response to such campaigns is to detect them and collect sufficient information regarding tools, techniques used to exploit the vulnerability. Hence effective capturing of the attack data and its timely dissemination to defenders is required for the mitigation and prevention of the large scale attacks. The objective of our survey is to make an automated attack data capturing and sharing mechanism. This study will help us in finalizing the standard format for information sharing, further which could be machine readable. Such a system would be able to timely capture and identify the presence of a large scale targeted attack campaigns and effectively share the attack data with the security agencies in a format that is readily usable\actionable by them. We have also highlighted the fact that the format for sharing attack data is very crucial and the data sharing format should be machine digestible to reduce the human intervention and increase the response time.

EXISTING SYSTEM :

? Existing attacks fall into two categories, based on their assumptions on how much information attacker has about the classifier. ? Through detailed experimentation and testing, we find that this vulnerability does in fact exist in a variety of the most popular image classification contexts, including facial and iris recognition, and the identification of traffic signs and flowers. ? Another group of attacks do not rely on querying the victim DNN, but assume there exists another model which has similar functionalities as the victim DNN. ? That state-of-the-art adversarial attacks can adapt and bypass most existing defense mechanisms.

DISADVANTAGE :

? Time reduction in problem resolution, vulnerability reports are automatically process and participation in a standard format with strong multivendor support. ? Mandiant searched for functionality potentially susceptible to injection-based issues allowing for remote code execution or unauthorized access to data stored within the SQL database or on the remote file system. ? Mandiant also carefully evaluated the Accellion FTA software’s authentication logic to ensure it was not vulnerable to an authentication bypass issue, which might allow an attacker to access an authenticated endpoint without being validly authenticated.

PROPOSED SYSTEM :

• We propose and evaluate multiple approaches for defense, including a neuron-distance technique that successfully defends against these attacks while also obfuscates the link between Teacher and Student models. • We will discuss the impact on performance, and propose techniques to extract such information from the Student using a few additional queries. • We first evaluate the proposed attacks assuming the attacker knows the exact transfer approach used to produce the Student model. • We identify techniques that allow attackers to associate Student models with their Teacher counterparts, and launch highly effective misclassification attacks on black-box Student modelS.

ADVANTAGE :

? Effecting sharing of this threat intelligence, various standards are emerging which enables researchers, security professionals, academicians to share threat intelligence efficiently in a common machine digestible data format. ? The scam program, “which is used to collect the network data” is utilized by the attacker and to make its use in the primitive of another attacks. ? Cybox is standardized XML based language which is used to represent observables in the operational domain for specification, capturing, characterization and communication of events or stately properties. ? It is helpful to express events such as file deletion, events, changes to registry keys values and communication via HTTP which would takes place at the time of attack

Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Chat on WhatsApp