SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011



        Performance Evaluation of Classifiers used for
            Identification of Encryption Algorithms
                                            Suhaila Omer Sharif1, Saad P. Mansoor2
                                1,2
                                      School of Computer Science, Bangor University, Bangor, UK
                                                     1
                                                       s.o.sharif@bangor.ac.uk
                                                    2
                                                      s.mansoor@bangor.ac.uk


Abstract—Evaluating classifier performance is a critical                for Identification of a block cipher. The identification of
problem in pattern recognition and machine learning. In this            encryption method was considered as a document
paper pattern recognition techniques were applied to identify           categorization task. A.Cufoglu et al. [2] used pattern
encryption algorithms. Four different block cipher algorithms           recognition classifiers to identify user profiling. The results
were considered, DES, IDEA, AES, and RC2 operating in
                                                                        observed that NB classifier generate the best performance
(Electronic Codebook) ECB mode. Eight different classification
techniques were used for this purpose, these are: Naïve                 over user related information. In [3] a study was carried out
Bayesian (NB), Support Vector Machine (SVM), neural                     to use classifiers to identify the cipher encryption method.
network (MLP), Instance based learning (IBL), Bagging (Ba),             The simulation results show that, the RoFo classifier has the
AdaBoostM1 (MdaBM1), Rotation Forest (RoFo), and Decision               highest classification accuracy attributes by using tree
Tree (C4. 5). The result shows that using pattern recognition           structures obligatory on Naïve Bayesian. In this study a
is a useful technique to identify the encryption algorithm,             simulation test was carried to evaluate different types of
and according to our simulation using one encryption of key             classifiers in terms of classification accuracy of the encryption
provide better classification than using different keys.                data.
Furthermore, increase the number of the input files will
improve the accuracy.
                                                                                           II.   BASICS OF CLASSIFIERS

Index Terms—Pattern Recognition, Classifiers, Encryption,                  This section briefly explains the classifiers used in this
Cryptanalysis                                                           study.
                       I. INTRODUCTION                                  A. Naive Bayesian (NB)
    A typical cipher takes a plaintext message and some secret               Naïve Bayesian is one of the most computationally
keying data as its input and produces an encrypted version              straightforward and efficient Bayesian Classifier methods. It
of the original message known as the ciphertext. An attack              has been used as an effective classifier for many years. It has
on a cipher can make use of the ciphertext alone or it can              two advantages over many other classifiers. The first being,
make use of some plaintext and its corresponding ciphertext.            it is easy to construct, as the structure is given a priori thus,
Cryptanalysis is the process of recovering the plaintext and/           no structure learning procedure is required. Secondly, the
or key from a ciphertext. Most encryption algorithms have a             classification process is very efficient. This is due to the
finite key space and, hence, are vulnerable to an exhaustive            assumption that all the features are independent of each other.
key search attack. However, it is very difficult to identify the        It has surprisingly out performed many sophisticated
encryption keys because the size of the key is such that the            classifiers, especially where the features are not strongly
time and resources required are not generally available. A              correlated [4].
random search through a finite but large key space is not               B. Support Vector Machines (SVMs)
usually an acceptable cryptanalysts tool. In cryptanalysis                  This is a useful technique for data classification. It is
when only the ciphertext is obtained, there are initially two           based on statistical learning theory presented by V.N.Vapnik,
significant tasks, identification of the encryption technique           and has been productively applied to many classification
applied, and the encryption key identification. Statistical             and pattern recognition problems such as text classification
techniques and machine learning based techniques have been              and image recognition. These methods do classification by
applied to identify the encryption method from the encrypted            building an N-dimensional hyper plane that optimally divides
files. In this work, however, we are exploring the possibility          the data into two groups: the training and test data points.
of identifying encryption algorithm by applying pattern                 The objective of SVM method is to produce a model (based
recognition techniques. The statistical methods use the                 on the training data) which predicts the target values of the
frequency at which letters of the alphabet occur in the                 test data knowing only the test data attributes [5].
encrypted file. While in machine learning based methods,
the task of identification of the encryption method is                  C. Neural Networks (MLP)
considered as a pattern classification task. There are a number             These classifiers are widely used in many fields. They
of research papers that evaluate some of the classification             model the concept of neurons in neuroscience and include
algorithm. Dileep [1] suggests using a Support Vector Machine           sets of connected nodes along with the weights for nodes
© 2011 ACEEE                                                       42
DOI: 02.ICT.2011.02.60
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


and arcs. Neural nets are self-organizing, adaptive and              for a base classifier, the feature set is randomly split into K
nonlinear. Neural network are versatile and powerful classifiers,    subsets (K is a parameter of the algorithm) and Principal
but they rely on a number of parameter choices to specify the        Component Analysis (PCA) is applied to each subset. All
network architecture and to control the training process [5,6].      principal components are retained in order to preserve the
                                                                     variability information in the data. Thus, K axis rotations take
D. Instance Based Learner (IBL)
                                                                     place to form the new features for a base classifier. The idea
    IBL generates classification predictions using only              behind the rotation approach is to encourage simultaneously
specific instances. Unlike Nearest Neighbour algorithm, IBL          individual accuracy and diversity within the ensemble.
normalizes its attributes’ ranges, processes instances               Diversity promoted through the feature extraction for each
incrementally, and has a simple policy for tolerating missing        base classifier. Decision trees were chosen here because they
values. IBL applies a simple Euclidean distance function to          are sensitive to rotation of the feature axes, hence the name
supply graded matches between training instances and given           “forest.” Accuracy is sought by keeping all principal
test instance [7]. Equation (1) represents the similarity that is    components and using the whole data set to train each base
used within the IBL algorithm.                                       classifier. A very useful characteristic of the proposed method
  Similarity(x, y) =                                        (1)      is that RoFo can be used in conjunction with practically any
                                                                     base classifies that are used in the ensemble creation process.
  Where n: is the number of instance attributes                      The thought of the rotation approach is to encourage
                                                                     simultaneously individual accuracy and diversity within the
The numeric value attributes are represented by (2).                 ensemble.

              f (xi, yi) = (xi – yi)2                   (2)          H. C4.5 Classification Algorithm
The Boolean and symbolic attributes are represented by (3).              This algorithm constructs a decision tree (DT) starting
                                                                     from a training set, which is a set of cases. Each case specifies
              f (xi, yi) = (xi   yi)                         (3)     values for a collection of attributes and for a class. The
                                                                     decision tree is used to classify (assign) a class value to a
E. Bagging (Ba)                                                      case depending on the values of the attributes of the case.
    This ensemble approach uses a predefined number of               The class specified at the leaf is the class predicted by the
classifier, each one trained on a bootstrap sample of training       decision tree. A performance measure of a decision tree over
data. Each classifier is trained on a set of n training examples,    a set of cases is the classification error which is the percentage
drawn randomly with replacement from the original training           of the misclassification cases whose predicted class differs
set of size n. Such a training set is called a bootstrap replicate   from actual class [12].
of the original set. Each bootstrap replicate contains, on
average, 63.2% of the original training set, with many examples                         III. EXPERMINT SETUP
appearing multiple times. [8, 9].
                                                                         Numbers of experiments were carried out to establish the
F. AdaBoost Algorithm Boosting                                       classifiers accuracy to identifying the following encryption
    The most popular classifier is AdaBoost, a powerful              algorithms AES, RC2, DES and IDEA, operating in electronic
classifier built with linear combination of member classifiers.      codebook (ECB) mode. In the simulation, different instances
The idea behind it is obtaining a highly accurate classifier by      were used (120, 240, and 400); these represent the total number
combining many weak classifiers. Each weak classifier is             of input files (ciphertext) used. The plaintext was encrypted
required to be moderately accurate, i.e. better than random          using 1, 3, 5, and 30 keys for each algorithm. Matlab® was
guessing. The classifiers in the ensemble are added one at a         used to extract an 8-bits histogram of the encrypted data;
time so that each subsequent classifier is trained on data,          this was then submitted to WEKA (Weikato Environment for
which have been “hard” for the previous ensemble members.            Knowledge Analysis) machine learning platform that supplies
A set of weights is maintained across the objects in the data        a work bench consisting of a collection of learning schemes,
set so that objects that have been difficult to classify acquire     which are applied for data mining and machine learning. The
more weight, forcing subsequent classifiers to focus on them.        primary learning schemes in Weka are “classifiers” and they
The ensemble construction through AdaBoost comes from                tempt a rule set or decision tree that models the data, in
theory and is, in fact, equivalent to a logistic regression model    addition Weka has different algorithms for learning
by a fitting an additive stage-wise estimation procedure. One        association rules clustering data, visualization, regression,
of the reasons why AdaBoost algorithm yields good results            and data processing.
is the diversity among the weak classifiers. Still, there is no
specific benchmark to determine diversity in the process [10,                         IV. SIMULATION RESULTS
11].                                                                 In this section the results of eight classifiers are com-
G. RotationForest (RoFo)                                         pared, based on the accuracy of the identification. The simu-
                                                                 lations conducted using four different block cipher algorithms
   This classifier is based on feature extraction and was
                                                                 with different key sizes. Each dataset have the same number
proposed by Rodriguez et al [10]. To create the training data
© 2011 ACEEE                                                  43
DOI: 02.ICT.2011.02.60
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


of attributes and different number of instances, which varies             64-bits, IDEA 128-bits, RC2 128-bits we used 30, 60 and 100
from 120 to 400 instances. A 10 fold cross-validations was                input files, thus the total numbers of the instances are 120,
used as a test mode where 10 pair of training sets and testing            240 and 400 respectively. Fig 2 shows that for all classifiers
sets is created. All the classifiers run on the same training sets        using 400 input files achieve high accuracy and using 100
and have been tested on the same testing sets to obtain the               input files achieved lowest accuracy. It is also evident that
classification accuracy. To estimate a value on training data             RoFo classifier produces the best results for all instances,
set, we define an accuracy measure as shown in equation (4).               and IBL perform very badly when operating with 100 and
                                                                          240 instances. In final simulation the effect of the number of
      Accuracy (%) =                                          (4)
                                                                          keys used to encrypt the plaintext was investigated for the
In the first simulation, we have been using 240 input files               following encryption algorithm AES, RC2, and IDEA with fixed
with AES (128,192, and 256-bits), DES 64-bit, IDEA 128-bit,               128-bit encryption key and DES with 64-bits. The number of
and RC2 (42, 84, and128-bits) where each algorithm has 30                 input files used was 30 and the number of keys was 1, 3, 5 and
input files. The simulation was conducted using different                 30. Here, Fig 3 shows that RoFo classifier has better overall
numbers of keys for each algorithm; Fig 1 shows the calculated            performance and AdaBM1 achieved lowest accuracy. Fur-
accuracy for different set of data. It can be seen that, using 1          thermore, and as expected all the classifiers (apart from
encryption key produces high classification accuracy (100%)               AdaBM1) produce good accuracy when using 1, 3 and 5
meaning that the 240 instances (files) were correctly classified.         encryption keys. It can be seen as expected that the accu-
In contrast using 30 different encryptions keys (one for each             racy drops to 25 –55 when using one key per each file (30
file) result in lower classification accuracy. This is expected           keys).
as the keys are generated randomly and will affect the pattern
of test data. The results show that the accuracy of the
classification will be reduced with increased the number of
the encryption keys. The second simulation, deals with the
effect of increasing the number of input files (instances) on
overall accuracy. Here for each algorithm, AES 128-bits, DES




                                                                                Figure 3. Encryption accuracy for different key seizes




       Figure 1. Classification accuracy for each algorithm




                                                                                                        (a) All data




                                                                                                   (b) Class centers
       Figure 2. Classification accuracy for each algorithm                            Figure 4. Scatter plot for 240 data points

© 2011 ACEEE                                                         44
DOI: 02.ICT.2011.02. 60
ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011


Fig 4, shows data scatter-plots and the centres of the 240                                          REFERENCES
data points. The plot shows that the classes are founded                 [1] A. Dileep and C. Chandra Sekhar, “Indemnification of Block
sporadically. The centres of the “clouds” of points for 8 classes        Ciphers using Support Vector Machines, “International Joint
were plotted in Fig 4-b, according to this plot, all algorithms          Conference on Neural Networks” Vancouver, Canada, pp. 2696–
have similar representation. Note that the scales of all plots           2701, July 16-21,2006.
are different. The class centres are indistinguishable if plot-          [2] A. Cufoglu, M. Lohi, K. Madani, “A Comparative Study of
ted on the axes of a subplot. Finally, we can say this high-             Selected Classifiers with Classification Accuracy in User Profiling”,
lights the difficulty in recognising the type of code through            World Congress on Computer Science and Information Engineering.
simple pattern classification methods. Fig 5 shows an image              Pp 708-712, San Francisco, 2009.
                                                                         [3] S.O. Sharif, L.I. Kuncheva, and S.P. Mansoor, “Classifying
of the distance matrix D computed by using identification
                                                                         Encryption Algorithms Using Pattern Recognition Techniques,”
accuracy of each encryption algorithm. The block of 30 by 30             Neural Networks, 3rd International Conference on Advanced
distances is outlining with black lines. Blue color means high           Computer Theory and Engineering (ICACTE), 2010
similarity while yellow and red indicate low similarity. The             [4] A.Cufoglu, M. Lohi, and K. Madani, “Classification Accuracy
class labels are as follows: 1 AES(128), 2 AES(192), 3 AES(256),         Performance of Naïve Bayesian (NB), Bayesian Networks (BN),
4 DES(64), 5 IDEA(128), 6 RC2(128),7 RC2(42), and 8 RC2(84).             Lazy Learning of Bayesian Rules (LBR) and Instance-Based Learner
The encoding technique that stands out from the rest is AES.             (IB1) - comparative study,” 2008 International Conference on
The 3-by-3 block sub-matrix in the top left corner is largely            Computer Engineering & Systems, 2008, pp. 210-215.
blue, shown the similarity within the code. Interestingly, AES           [5] L. I. Kuncheva., J. J. Rodríguez, “Classifier ensembles for
                                                                         fMRI data analysis: an experiment,” Magnetic resonance imaging,
algorithm is distinguishable from the rest of the algorithm
                                                                         vol. 28, no. 4, pp. 583-93, May. 2010.
also noted that the three versions of AES (128, 192, and 256)            [6] Y. Maeda and M. Wakamura, “Simultaneous Perturbation
are not distinguishable within AES. The red vertical and hori-           Learning rule for Recurrent neural Networks and its FPGA
zontal lines demonstrate the unusually large distances com-              implementation.,” IEEE transactions on neural networks a
pared to the rest. Unlike ECB, there is no clear pattern to              publication of the IEEE Neural Networks Council, vol. 16, 2005,
suggest that any of the codes are distinguishable.                       pp. 1664-1672.
                                                                         [7]David W. Aha, Kibler D. and K. Albert M. (1991) " Instance-
                                                                         based learning algorithms" . Machine Learning journal, Vol 1, No 6,
                                                                         ISDN 1573- 0565, pp. 37-66. [Online] Available from: http://
                                                                         www.springerlink.com/content/kn127378pg361187/fulltext.pdf
                                                                         [8] Q. He, F. Zhuang, X. Zhao, and Z. Shi, “Enhanced Algorithm
                                                                         Performance for Classification Based on Hyper Surface using
                                                                         Bagging and Adaboost,” 2007 International Conference on Machine
                                                                         Learning and Cybernetics, 2007, pp. 3624-3629.
                                                                         [9] S. Ruggieri, “Efficient C4.5” IEEE Transactions on Knowledge
                                                                         and Data Engineering, vol. 14, 2002, pp. 438-444.
                                                                         [10] J.J. Rodríguez, L.I. Kuncheva, and C.J. Alonso, “Rotation
                                                                         forest: A new Classifier Ensemble method,” IEEE transactions on
                                                                         pattern analysis and machine intelligence, vol. 28, 2006, pp. 1619-
                                                                         1630.
                                                                         [11] T.-K. An and M.-H. Kim, “A New Diverse AdaBoost
                                                                         Classifier,” 2010 International Conference on Artificial Intelligence
                   Figure 5. Distance matrix D
                                                                         and Computational Intelligence, pp. 359-363, Oct. 2010.
                                                                         [12] G. Stiglic and P. Kokol, “Effectiveness of Rotation Forest in
                                                                         Meta- learning Based Gene Expression Classification,” Symposium
                          CONCLUSIONS                                    a Quarterly Journal in Modern Foreign Literatures, 2007.
    In this paper, a simulation experiment was conducted to
identify encryption algorithm of encrypted data using variety
of classifies. The results show that pattern recognition
techniques, are useful tools for cryptanalysis as a means of
identifying the type of encryption algorithm used to encrypt
the data. This work shows that increasing the number of
encryption keys will result in reducing the classification
accuracy. Nevertheless, the result shows that it is possible
to achieve accuracy above 40% with some classifiers when
each file was encrypted with different key. It was also clear
that increase the number of files used will improve accuracy.




© 2011 ACEEE                                                        45
DOI: 02.ICT.2011.02. 60

Más contenido relacionado

La actualidad más candente

Autoencoders for image_classification
Autoencoders for image_classificationAutoencoders for image_classification
Autoencoders for image_classificationCenk Bircanoğlu
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...
HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...
HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...Albert Orriols-Puig
 
Artificial neural networks and its application
Artificial neural networks and its applicationArtificial neural networks and its application
Artificial neural networks and its applicationHưng Đặng
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14
Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14
Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14Daniel Lewis
 
Deep Style: Using Variational Auto-encoders for Image Generation
Deep Style: Using Variational Auto-encoders for Image GenerationDeep Style: Using Variational Auto-encoders for Image Generation
Deep Style: Using Variational Auto-encoders for Image GenerationTJ Torres
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 
Practical deepllearningv1
Practical deepllearningv1Practical deepllearningv1
Practical deepllearningv1arthi v
 
SOIAM (SOINN-AM)
SOIAM (SOINN-AM)SOIAM (SOINN-AM)
SOIAM (SOINN-AM)SOINN Inc.
 
Mcs 024 assignment solution (2020-21)
Mcs 024 assignment solution (2020-21)Mcs 024 assignment solution (2020-21)
Mcs 024 assignment solution (2020-21)smumbahelp
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationeSAT Publishing House
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Survey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesSurvey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesPrincy Joy
 
Study of Different Multi-instance Learning kNN Algorithms
Study of Different Multi-instance Learning kNN AlgorithmsStudy of Different Multi-instance Learning kNN Algorithms
Study of Different Multi-instance Learning kNN AlgorithmsEditor IJCATR
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learningijtsrd
 

La actualidad más candente (19)

Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
Et25897899
Et25897899Et25897899
Et25897899
 
Autoencoders for image_classification
Autoencoders for image_classificationAutoencoders for image_classification
Autoencoders for image_classification
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...
HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...
HIS'2008: Genetic-based Synthetic Data Sets for the Analysis of Classifiers B...
 
Artificial neural networks and its application
Artificial neural networks and its applicationArtificial neural networks and its application
Artificial neural networks and its application
 
L026070074
L026070074L026070074
L026070074
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14
Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14
Piotr Mirowski - Review Autoencoders (Deep Learning) - CIUUK14
 
Deep Style: Using Variational Auto-encoders for Image Generation
Deep Style: Using Variational Auto-encoders for Image GenerationDeep Style: Using Variational Auto-encoders for Image Generation
Deep Style: Using Variational Auto-encoders for Image Generation
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 
Practical deepllearningv1
Practical deepllearningv1Practical deepllearningv1
Practical deepllearningv1
 
SOIAM (SOINN-AM)
SOIAM (SOINN-AM)SOIAM (SOINN-AM)
SOIAM (SOINN-AM)
 
Mcs 024 assignment solution (2020-21)
Mcs 024 assignment solution (2020-21)Mcs 024 assignment solution (2020-21)
Mcs 024 assignment solution (2020-21)
 
Dynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentationDynamic thresholding on speech segmentation
Dynamic thresholding on speech segmentation
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Survey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniquesSurvey on Deep Neural Network Watermarking techniques
Survey on Deep Neural Network Watermarking techniques
 
Study of Different Multi-instance Learning kNN Algorithms
Study of Different Multi-instance Learning kNN AlgorithmsStudy of Different Multi-instance Learning kNN Algorithms
Study of Different Multi-instance Learning kNN Algorithms
 
Image Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine LearningImage Captioning Generator using Deep Machine Learning
Image Captioning Generator using Deep Machine Learning
 

Destacado

Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackSecurity evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackShakas Technologies
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Pluribus One
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Pluribus One
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsPluribus One
 
Assessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with CongestionAssessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with CongestionIDES Editor
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesIDES Editor
 
An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationIDES Editor
 
FPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmFPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmIDES Editor
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesIDES Editor
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...IDES Editor
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringIDES Editor
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingIDES Editor
 
GR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash MemoryGR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash MemoryIDES Editor
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...IDES Editor
 
LabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process ControlLabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process ControlIDES Editor
 
Black Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control SystemsBlack Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control SystemsIDES Editor
 
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...IDES Editor
 
Interleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost ConverterInterleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost ConverterIDES Editor
 
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...IDES Editor
 

Destacado (20)

Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackSecurity evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...Design of robust classifiers for adversarial environments - Systems, Man, and...
Design of robust classifiers for adversarial environments - Systems, Man, and...
 
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
Battista Biggio, Invited Keynote @ AISec 2014 - On Learning and Recognition o...
 
Understanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environmentsUnderstanding the risk factors of learning in adversarial environments
Understanding the risk factors of learning in adversarial environments
 
Assessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with CongestionAssessment of Market Power in Deregulated Electricity Market with Congestion
Assessment of Market Power in Deregulated Electricity Market with Congestion
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Neural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital ImagesNeural Network Based Noise Identification in Digital Images
Neural Network Based Noise Identification in Digital Images
 
An Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender ClassificationAn Information Maximization approach of ICA for Gender Classification
An Information Maximization approach of ICA for Gender Classification
 
FPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT AlgorithmFPGA Based Design of High Performance Decimator using DALUT Algorithm
FPGA Based Design of High Performance Decimator using DALUT Algorithm
 
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D FacesDepth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
Depth-Image-based Facial Analysis between Age Groups and Recognition of 3D Faces
 
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC...
 
An Iterative Improved k-means Clustering
An Iterative Improved k-means ClusteringAn Iterative Improved k-means Clustering
An Iterative Improved k-means Clustering
 
User Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory SensingUser Controlled Privacy in Participatory Sensing
User Controlled Privacy in Participatory Sensing
 
GR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash MemoryGR-FB Block Cleaning Scheme in Flash Memory
GR-FB Block Cleaning Scheme in Flash Memory
 
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
An Adaptive Energy Efficient Reliable Routing Protocol for Wireless Sensor Ne...
 
LabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process ControlLabVIEW - Teaching Aid for Process Control
LabVIEW - Teaching Aid for Process Control
 
Black Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control SystemsBlack Box for Machine Tools; Based on Open CNC Architecture Control Systems
Black Box for Machine Tools; Based on Open CNC Architecture Control Systems
 
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
Genetic Algorithm based Optimal Placement of Distributed Generation Reducing ...
 
Interleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost ConverterInterleaving Technique in Multiphase Buck & Boost Converter
Interleaving Technique in Multiphase Buck & Boost Converter
 
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
 

Similar a Performance Evaluation of Classifiers used for Identification of Encryption Algorithms

Improving Classifier Accuracy using Unlabeled Data..doc
Improving Classifier Accuracy using Unlabeled Data..docImproving Classifier Accuracy using Unlabeled Data..doc
Improving Classifier Accuracy using Unlabeled Data..docbutest
 
Types of Machine Learnig Algorithms(CART, ID3)
Types of Machine Learnig Algorithms(CART, ID3)Types of Machine Learnig Algorithms(CART, ID3)
Types of Machine Learnig Algorithms(CART, ID3)Fatimakhan325
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGIJNSA Journal
 
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCERKNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCERcscpconf
 
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionA Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionIJCSIS Research Publications
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...inventionjournals
 
An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...Alexander Decker
 
SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.bhavinecindus
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Miningijdmtaiir
 
Ijartes v1-i2-006
Ijartes v1-i2-006Ijartes v1-i2-006
Ijartes v1-i2-006IJARTES
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
Analysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String RecognitionAnalysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String RecognitionIDES Editor
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET Journal
 
Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...CSITiaesprime
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A ReviewIOSRjournaljce
 
Performance Evaluation of Different Data Mining Classification Algorithm and ...
Performance Evaluation of Different Data Mining Classification Algorithm and ...Performance Evaluation of Different Data Mining Classification Algorithm and ...
Performance Evaluation of Different Data Mining Classification Algorithm and ...IOSR Journals
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...IDES Editor
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIOSR Journals
 

Similar a Performance Evaluation of Classifiers used for Identification of Encryption Algorithms (20)

Improving Classifier Accuracy using Unlabeled Data..doc
Improving Classifier Accuracy using Unlabeled Data..docImproving Classifier Accuracy using Unlabeled Data..doc
Improving Classifier Accuracy using Unlabeled Data..doc
 
Types of Machine Learnig Algorithms(CART, ID3)
Types of Machine Learnig Algorithms(CART, ID3)Types of Machine Learnig Algorithms(CART, ID3)
Types of Machine Learnig Algorithms(CART, ID3)
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
 
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCERKNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
KNOWLEDGE BASED ANALYSIS OF VARIOUS STATISTICAL TOOLS IN DETECTING BREAST CANCER
 
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion DetectionA Stacked Generalization Ensemble Approach for Improved Intrusion Detection
A Stacked Generalization Ensemble Approach for Improved Intrusion Detection
 
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
Performance Analysis of Various Data Mining Techniques on Banknote Authentica...
 
An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...An efficient technique for color image classification based on lower feature ...
An efficient technique for color image classification based on lower feature ...
 
SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.
 
Analysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data MiningAnalysis of Classification Algorithm in Data Mining
Analysis of Classification Algorithm in Data Mining
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Ijartes v1-i2-006
Ijartes v1-i2-006Ijartes v1-i2-006
Ijartes v1-i2-006
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
Analysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String RecognitionAnalysis of Neocognitron of Neural Network Method in the String Recognition
Analysis of Neocognitron of Neural Network Method in the String Recognition
 
JOSA TechTalks - Machine Learning in Practice
JOSA TechTalks - Machine Learning in PracticeJOSA TechTalks - Machine Learning in Practice
JOSA TechTalks - Machine Learning in Practice
 
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for CybersecurityIRJET- Machine Learning and Deep Learning Methods for Cybersecurity
IRJET- Machine Learning and Deep Learning Methods for Cybersecurity
 
Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...Exploring and comparing various machine and deep learning technique algorithm...
Exploring and comparing various machine and deep learning technique algorithm...
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
Performance Evaluation of Different Data Mining Classification Algorithm and ...
Performance Evaluation of Different Data Mining Classification Algorithm and ...Performance Evaluation of Different Data Mining Classification Algorithm and ...
Performance Evaluation of Different Data Mining Classification Algorithm and ...
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
 
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set ReductionIntrusion Detection System Based on K-Star Classifier and Feature Set Reduction
Intrusion Detection System Based on K-Star Classifier and Feature Set Reduction
 

Más de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Más de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Último (20)

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Performance Evaluation of Classifiers used for Identification of Encryption Algorithms

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 Performance Evaluation of Classifiers used for Identification of Encryption Algorithms Suhaila Omer Sharif1, Saad P. Mansoor2 1,2 School of Computer Science, Bangor University, Bangor, UK 1 s.o.sharif@bangor.ac.uk 2 s.mansoor@bangor.ac.uk Abstract—Evaluating classifier performance is a critical for Identification of a block cipher. The identification of problem in pattern recognition and machine learning. In this encryption method was considered as a document paper pattern recognition techniques were applied to identify categorization task. A.Cufoglu et al. [2] used pattern encryption algorithms. Four different block cipher algorithms recognition classifiers to identify user profiling. The results were considered, DES, IDEA, AES, and RC2 operating in observed that NB classifier generate the best performance (Electronic Codebook) ECB mode. Eight different classification techniques were used for this purpose, these are: Naïve over user related information. In [3] a study was carried out Bayesian (NB), Support Vector Machine (SVM), neural to use classifiers to identify the cipher encryption method. network (MLP), Instance based learning (IBL), Bagging (Ba), The simulation results show that, the RoFo classifier has the AdaBoostM1 (MdaBM1), Rotation Forest (RoFo), and Decision highest classification accuracy attributes by using tree Tree (C4. 5). The result shows that using pattern recognition structures obligatory on Naïve Bayesian. In this study a is a useful technique to identify the encryption algorithm, simulation test was carried to evaluate different types of and according to our simulation using one encryption of key classifiers in terms of classification accuracy of the encryption provide better classification than using different keys. data. Furthermore, increase the number of the input files will improve the accuracy. II. BASICS OF CLASSIFIERS Index Terms—Pattern Recognition, Classifiers, Encryption, This section briefly explains the classifiers used in this Cryptanalysis study. I. INTRODUCTION A. Naive Bayesian (NB) A typical cipher takes a plaintext message and some secret Naïve Bayesian is one of the most computationally keying data as its input and produces an encrypted version straightforward and efficient Bayesian Classifier methods. It of the original message known as the ciphertext. An attack has been used as an effective classifier for many years. It has on a cipher can make use of the ciphertext alone or it can two advantages over many other classifiers. The first being, make use of some plaintext and its corresponding ciphertext. it is easy to construct, as the structure is given a priori thus, Cryptanalysis is the process of recovering the plaintext and/ no structure learning procedure is required. Secondly, the or key from a ciphertext. Most encryption algorithms have a classification process is very efficient. This is due to the finite key space and, hence, are vulnerable to an exhaustive assumption that all the features are independent of each other. key search attack. However, it is very difficult to identify the It has surprisingly out performed many sophisticated encryption keys because the size of the key is such that the classifiers, especially where the features are not strongly time and resources required are not generally available. A correlated [4]. random search through a finite but large key space is not B. Support Vector Machines (SVMs) usually an acceptable cryptanalysts tool. In cryptanalysis This is a useful technique for data classification. It is when only the ciphertext is obtained, there are initially two based on statistical learning theory presented by V.N.Vapnik, significant tasks, identification of the encryption technique and has been productively applied to many classification applied, and the encryption key identification. Statistical and pattern recognition problems such as text classification techniques and machine learning based techniques have been and image recognition. These methods do classification by applied to identify the encryption method from the encrypted building an N-dimensional hyper plane that optimally divides files. In this work, however, we are exploring the possibility the data into two groups: the training and test data points. of identifying encryption algorithm by applying pattern The objective of SVM method is to produce a model (based recognition techniques. The statistical methods use the on the training data) which predicts the target values of the frequency at which letters of the alphabet occur in the test data knowing only the test data attributes [5]. encrypted file. While in machine learning based methods, the task of identification of the encryption method is C. Neural Networks (MLP) considered as a pattern classification task. There are a number These classifiers are widely used in many fields. They of research papers that evaluate some of the classification model the concept of neurons in neuroscience and include algorithm. Dileep [1] suggests using a Support Vector Machine sets of connected nodes along with the weights for nodes © 2011 ACEEE 42 DOI: 02.ICT.2011.02.60
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 and arcs. Neural nets are self-organizing, adaptive and for a base classifier, the feature set is randomly split into K nonlinear. Neural network are versatile and powerful classifiers, subsets (K is a parameter of the algorithm) and Principal but they rely on a number of parameter choices to specify the Component Analysis (PCA) is applied to each subset. All network architecture and to control the training process [5,6]. principal components are retained in order to preserve the variability information in the data. Thus, K axis rotations take D. Instance Based Learner (IBL) place to form the new features for a base classifier. The idea IBL generates classification predictions using only behind the rotation approach is to encourage simultaneously specific instances. Unlike Nearest Neighbour algorithm, IBL individual accuracy and diversity within the ensemble. normalizes its attributes’ ranges, processes instances Diversity promoted through the feature extraction for each incrementally, and has a simple policy for tolerating missing base classifier. Decision trees were chosen here because they values. IBL applies a simple Euclidean distance function to are sensitive to rotation of the feature axes, hence the name supply graded matches between training instances and given “forest.” Accuracy is sought by keeping all principal test instance [7]. Equation (1) represents the similarity that is components and using the whole data set to train each base used within the IBL algorithm. classifier. A very useful characteristic of the proposed method Similarity(x, y) = (1) is that RoFo can be used in conjunction with practically any base classifies that are used in the ensemble creation process. Where n: is the number of instance attributes The thought of the rotation approach is to encourage simultaneously individual accuracy and diversity within the The numeric value attributes are represented by (2). ensemble. f (xi, yi) = (xi – yi)2 (2) H. C4.5 Classification Algorithm The Boolean and symbolic attributes are represented by (3). This algorithm constructs a decision tree (DT) starting from a training set, which is a set of cases. Each case specifies f (xi, yi) = (xi yi) (3) values for a collection of attributes and for a class. The decision tree is used to classify (assign) a class value to a E. Bagging (Ba) case depending on the values of the attributes of the case. This ensemble approach uses a predefined number of The class specified at the leaf is the class predicted by the classifier, each one trained on a bootstrap sample of training decision tree. A performance measure of a decision tree over data. Each classifier is trained on a set of n training examples, a set of cases is the classification error which is the percentage drawn randomly with replacement from the original training of the misclassification cases whose predicted class differs set of size n. Such a training set is called a bootstrap replicate from actual class [12]. of the original set. Each bootstrap replicate contains, on average, 63.2% of the original training set, with many examples III. EXPERMINT SETUP appearing multiple times. [8, 9]. Numbers of experiments were carried out to establish the F. AdaBoost Algorithm Boosting classifiers accuracy to identifying the following encryption The most popular classifier is AdaBoost, a powerful algorithms AES, RC2, DES and IDEA, operating in electronic classifier built with linear combination of member classifiers. codebook (ECB) mode. In the simulation, different instances The idea behind it is obtaining a highly accurate classifier by were used (120, 240, and 400); these represent the total number combining many weak classifiers. Each weak classifier is of input files (ciphertext) used. The plaintext was encrypted required to be moderately accurate, i.e. better than random using 1, 3, 5, and 30 keys for each algorithm. Matlab® was guessing. The classifiers in the ensemble are added one at a used to extract an 8-bits histogram of the encrypted data; time so that each subsequent classifier is trained on data, this was then submitted to WEKA (Weikato Environment for which have been “hard” for the previous ensemble members. Knowledge Analysis) machine learning platform that supplies A set of weights is maintained across the objects in the data a work bench consisting of a collection of learning schemes, set so that objects that have been difficult to classify acquire which are applied for data mining and machine learning. The more weight, forcing subsequent classifiers to focus on them. primary learning schemes in Weka are “classifiers” and they The ensemble construction through AdaBoost comes from tempt a rule set or decision tree that models the data, in theory and is, in fact, equivalent to a logistic regression model addition Weka has different algorithms for learning by a fitting an additive stage-wise estimation procedure. One association rules clustering data, visualization, regression, of the reasons why AdaBoost algorithm yields good results and data processing. is the diversity among the weak classifiers. Still, there is no specific benchmark to determine diversity in the process [10, IV. SIMULATION RESULTS 11]. In this section the results of eight classifiers are com- G. RotationForest (RoFo) pared, based on the accuracy of the identification. The simu- lations conducted using four different block cipher algorithms This classifier is based on feature extraction and was with different key sizes. Each dataset have the same number proposed by Rodriguez et al [10]. To create the training data © 2011 ACEEE 43 DOI: 02.ICT.2011.02.60
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 of attributes and different number of instances, which varies 64-bits, IDEA 128-bits, RC2 128-bits we used 30, 60 and 100 from 120 to 400 instances. A 10 fold cross-validations was input files, thus the total numbers of the instances are 120, used as a test mode where 10 pair of training sets and testing 240 and 400 respectively. Fig 2 shows that for all classifiers sets is created. All the classifiers run on the same training sets using 400 input files achieve high accuracy and using 100 and have been tested on the same testing sets to obtain the input files achieved lowest accuracy. It is also evident that classification accuracy. To estimate a value on training data RoFo classifier produces the best results for all instances, set, we define an accuracy measure as shown in equation (4). and IBL perform very badly when operating with 100 and 240 instances. In final simulation the effect of the number of Accuracy (%) = (4) keys used to encrypt the plaintext was investigated for the In the first simulation, we have been using 240 input files following encryption algorithm AES, RC2, and IDEA with fixed with AES (128,192, and 256-bits), DES 64-bit, IDEA 128-bit, 128-bit encryption key and DES with 64-bits. The number of and RC2 (42, 84, and128-bits) where each algorithm has 30 input files used was 30 and the number of keys was 1, 3, 5 and input files. The simulation was conducted using different 30. Here, Fig 3 shows that RoFo classifier has better overall numbers of keys for each algorithm; Fig 1 shows the calculated performance and AdaBM1 achieved lowest accuracy. Fur- accuracy for different set of data. It can be seen that, using 1 thermore, and as expected all the classifiers (apart from encryption key produces high classification accuracy (100%) AdaBM1) produce good accuracy when using 1, 3 and 5 meaning that the 240 instances (files) were correctly classified. encryption keys. It can be seen as expected that the accu- In contrast using 30 different encryptions keys (one for each racy drops to 25 –55 when using one key per each file (30 file) result in lower classification accuracy. This is expected keys). as the keys are generated randomly and will affect the pattern of test data. The results show that the accuracy of the classification will be reduced with increased the number of the encryption keys. The second simulation, deals with the effect of increasing the number of input files (instances) on overall accuracy. Here for each algorithm, AES 128-bits, DES Figure 3. Encryption accuracy for different key seizes Figure 1. Classification accuracy for each algorithm (a) All data (b) Class centers Figure 2. Classification accuracy for each algorithm Figure 4. Scatter plot for 240 data points © 2011 ACEEE 44 DOI: 02.ICT.2011.02. 60
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011 Fig 4, shows data scatter-plots and the centres of the 240 REFERENCES data points. The plot shows that the classes are founded [1] A. Dileep and C. Chandra Sekhar, “Indemnification of Block sporadically. The centres of the “clouds” of points for 8 classes Ciphers using Support Vector Machines, “International Joint were plotted in Fig 4-b, according to this plot, all algorithms Conference on Neural Networks” Vancouver, Canada, pp. 2696– have similar representation. Note that the scales of all plots 2701, July 16-21,2006. are different. The class centres are indistinguishable if plot- [2] A. Cufoglu, M. Lohi, K. Madani, “A Comparative Study of ted on the axes of a subplot. Finally, we can say this high- Selected Classifiers with Classification Accuracy in User Profiling”, lights the difficulty in recognising the type of code through World Congress on Computer Science and Information Engineering. simple pattern classification methods. Fig 5 shows an image Pp 708-712, San Francisco, 2009. [3] S.O. Sharif, L.I. Kuncheva, and S.P. Mansoor, “Classifying of the distance matrix D computed by using identification Encryption Algorithms Using Pattern Recognition Techniques,” accuracy of each encryption algorithm. The block of 30 by 30 Neural Networks, 3rd International Conference on Advanced distances is outlining with black lines. Blue color means high Computer Theory and Engineering (ICACTE), 2010 similarity while yellow and red indicate low similarity. The [4] A.Cufoglu, M. Lohi, and K. Madani, “Classification Accuracy class labels are as follows: 1 AES(128), 2 AES(192), 3 AES(256), Performance of Naïve Bayesian (NB), Bayesian Networks (BN), 4 DES(64), 5 IDEA(128), 6 RC2(128),7 RC2(42), and 8 RC2(84). Lazy Learning of Bayesian Rules (LBR) and Instance-Based Learner The encoding technique that stands out from the rest is AES. (IB1) - comparative study,” 2008 International Conference on The 3-by-3 block sub-matrix in the top left corner is largely Computer Engineering & Systems, 2008, pp. 210-215. blue, shown the similarity within the code. Interestingly, AES [5] L. I. Kuncheva., J. J. Rodríguez, “Classifier ensembles for fMRI data analysis: an experiment,” Magnetic resonance imaging, algorithm is distinguishable from the rest of the algorithm vol. 28, no. 4, pp. 583-93, May. 2010. also noted that the three versions of AES (128, 192, and 256) [6] Y. Maeda and M. Wakamura, “Simultaneous Perturbation are not distinguishable within AES. The red vertical and hori- Learning rule for Recurrent neural Networks and its FPGA zontal lines demonstrate the unusually large distances com- implementation.,” IEEE transactions on neural networks a pared to the rest. Unlike ECB, there is no clear pattern to publication of the IEEE Neural Networks Council, vol. 16, 2005, suggest that any of the codes are distinguishable. pp. 1664-1672. [7]David W. Aha, Kibler D. and K. Albert M. (1991) " Instance- based learning algorithms" . Machine Learning journal, Vol 1, No 6, ISDN 1573- 0565, pp. 37-66. [Online] Available from: http:// www.springerlink.com/content/kn127378pg361187/fulltext.pdf [8] Q. He, F. Zhuang, X. Zhao, and Z. Shi, “Enhanced Algorithm Performance for Classification Based on Hyper Surface using Bagging and Adaboost,” 2007 International Conference on Machine Learning and Cybernetics, 2007, pp. 3624-3629. [9] S. Ruggieri, “Efficient C4.5” IEEE Transactions on Knowledge and Data Engineering, vol. 14, 2002, pp. 438-444. [10] J.J. Rodríguez, L.I. Kuncheva, and C.J. Alonso, “Rotation forest: A new Classifier Ensemble method,” IEEE transactions on pattern analysis and machine intelligence, vol. 28, 2006, pp. 1619- 1630. [11] T.-K. An and M.-H. Kim, “A New Diverse AdaBoost Classifier,” 2010 International Conference on Artificial Intelligence Figure 5. Distance matrix D and Computational Intelligence, pp. 359-363, Oct. 2010. [12] G. Stiglic and P. Kokol, “Effectiveness of Rotation Forest in Meta- learning Based Gene Expression Classification,” Symposium CONCLUSIONS a Quarterly Journal in Modern Foreign Literatures, 2007. In this paper, a simulation experiment was conducted to identify encryption algorithm of encrypted data using variety of classifies. The results show that pattern recognition techniques, are useful tools for cryptanalysis as a means of identifying the type of encryption algorithm used to encrypt the data. This work shows that increasing the number of encryption keys will result in reducing the classification accuracy. Nevertheless, the result shows that it is possible to achieve accuracy above 40% with some classifiers when each file was encrypted with different key. It was also clear that increase the number of files used will improve accuracy. © 2011 ACEEE 45 DOI: 02.ICT.2011.02. 60