Next Article in Journal
Comparison of the Trilateral Flash Cycle and Rankine Cycle with Organic Fluid Using the Pinch Point Temperature
Next Article in Special Issue
Fuzzy Kolmogorov Complexity Based on a Classical Description
Previous Article in Journal
The Interdependence of Autonomous Human-Machine Teams: The Entropy of Teams, But Not Individuals, Advances Science
Previous Article in Special Issue
Magnetotelluric Signal-Noise Separation Using IE-LZC and MP
Open AccessArticle

A Survey on Using Kolmogorov Complexity in Cybersecurity

Computer Science Department, Faculty of Science, University of Porto, Rua do Campo Alegre 1021/1055, 4169-007 Porto, Portugal
Author to whom correspondence should be addressed.
Entropy 2019, 21(12), 1196;
Received: 11 November 2019 / Revised: 28 November 2019 / Accepted: 2 December 2019 / Published: 5 December 2019
(This article belongs to the Special Issue Shannon Information and Kolmogorov Complexity)
Security and privacy concerns are challenging the way users interact with devices. The number of devices connected to a home or enterprise network increases every day. Nowadays, the security of information systems is relevant as user information is constantly being shared and moving in the cloud; however, there are still many problems such as, unsecured web interfaces, weak authentication, insecure networks, lack of encryption, among others, that make services insecure. The software implementations that are currently deployed in companies should have updates and control, as cybersecurity threats increasingly appearing over time. There is already some research towards solutions and methods to predict new attacks or classify variants of previous known attacks, such as (algorithmic) information theory. This survey combines all relevant applications of this topic (also known as Kolmogorov Complexity) in the security and privacy domains. The use of Kolmogorov-based approaches is resource-focused without the need for specific knowledge of the topic under analysis. We have defined a taxonomy with already existing work to classify their different application areas and open up new research questions. View Full-Text
Keywords: NCD; CDM; LZJD; Kolmogorov; security; privacy; cybersecurity NCD; CDM; LZJD; Kolmogorov; security; privacy; cybersecurity
Show Figures

Figure 1

MDPI and ACS Style

S. Resende, J.; Martins, R.; Antunes, L. A Survey on Using Kolmogorov Complexity in Cybersecurity. Entropy 2019, 21, 1196.

AMA Style

S. Resende J, Martins R, Antunes L. A Survey on Using Kolmogorov Complexity in Cybersecurity. Entropy. 2019; 21(12):1196.

Chicago/Turabian Style

S. Resende, João; Martins, Rolando; Antunes, Luís. 2019. "A Survey on Using Kolmogorov Complexity in Cybersecurity" Entropy 21, no. 12: 1196.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop