منابع مشابه
Revisiting Email Spoofing Attacks
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...
متن کاملSpoofing Attacks of Domain Name System Internet
The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The j...
متن کاملSpoofing Attacks in wireless Sensor Networks
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our...
متن کاملControlling UAVs with Sensor Input Spoofing Attacks
There has been a recent surge in interest in autonomous robots and vehicles. From the Google self-driving car, to autonomous delivery robots, to hobbyist UAVs, there is a staggering variety of proposed deployments for autonomous vehicles. Ensuring that such vehicles can plan and execute routes safely is crucial. The key insight of our paper is that the sensors that autonomous vehicles use to na...
متن کاملImproving Gait Biometrics under Spoofing Attacks
Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/883-1254