نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

Journal: :EURASIP J. Image and Video Processing 2014
Tiago de Freitas Pereira Jukka Komulainen André Anjos José Mario De Martino Abdenour Hadid Matti Pietikäinen Sébastien Marcel

User authentication is an important step to protect information, and in this context, face biometrics is potentially advantageous. Face biometrics is natural, intuitive, easy to use, and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using cheap low-tech equipment. This paper introduces a novel and appealing approach to detect...

Journal: :Circuits Systems and Signal Processing 2022

Abstract Spoofing attacks posed by generating artificial speech can severely degrade the performance of a speaker verification system. Recently, many anti-spoofing countermeasures have been proposed for detecting varying types from synthetic to replay presentations. While there are numerous effective defenses reported on standalone solutions, integration and spoofing detection systems has obvio...

2009

IP spoofing accompanies and exacerbates many Internet security threats. In distributed denial-of-service (DDoS) attacks spoofing prevents the attack target from recognizing legitimate clients and forces inaccurate filtering response. In reflector DDoS attacks, spoofing invokes unsolicited responses from Internet servers to the target. Spoofing is also used for distributed vulnerability scanning...

2014
Konstantin Simonchik Vadim Shchemelinin

The paper describes the “STC Spoofing” database, which consists of a set of recordings of “live” speech by several speakers, as well as synthesized speech fragments obtained using a TTS engine based on these speakers’ voices. The database can be used for testing the robustness of textdependent speaker verification systems against spoofing attacks, as well as for research and development of meth...

2014
P. KIRUTHIKA

--Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofers and localization of the same is a challenging task in wireless sensor network. This paper presents expository survey of various spoofing attack det...

2015
Kang Wang Shuhua Chen Aimin Pan

Time and position data of mobile devices are trusted without checking by most vendors and developers. We discover a method of GPS spoofing with low-cost SDR devices. The method can be used to alter the location status as well as the time of affected devices, which poses a security threat to location-based services. We also examine other positioning methods used by smart devices (e.g. WiFi) and ...

Journal: :CoRR 2017
Jason N. Gross Cagri Kilic Todd E. Humphreys

We propose an extension to the so-called PD detector. The PD detector jointly monitors received power and correlation profile distortion to detect the presence of GNSS carry-off-type spoofing, jamming, or multipath. We show that classification performance can be significantly improved by replacing the PD detector’s symmetric-difference-based distortion measurement with one based on the post-fit...

Journal: :CoRR 2015
Fabrice J. Ryba Matthew Orlinski Matthias Wählisch Christian Rossow Thomas C. Schmidt

The severity of amplification attacks has grown in recent years. Since 2013 there have been at least two attacks which involved over 300Gbps of attack traffic. This paper offers an analysis of these and many other amplification attacks. We compare a wide selection of different proposals for detecting and preventing amplification attacks, as well as proposals for tracing the attackers. Since sou...

2014
P. Seetha Ramakrishna P. Samba Siva Rao Abdul Vahed

— now a day spoofing has occupied in many network areas. Mainly it will effect on the networks, because everyone is copying the others things and implementing then we can do all things very simply and we can launch this process easily. In the network each and every data in sharing has been used by cryptographic from. To stop the spoofing and to identify this we are implemented a some of the met...

2013
Nesli Erdogmus Sébastien Marcel

Vulnerability to spoofing attacks is a serious drawback for many biometric systems. Among all biometric traits, face is the one that is exposed to the most serious threat, since it is exceptionally easy to access. The limited work on fraud detection capabilities for face mainly shapes around 2D attacks forged by displaying printed photos or replaying recorded videos on mobile devices. A signifi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید