نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2013
Zhizheng Wu Anthony Larcher Kong-Aik Lee Chng Eng Siong Tomi Kinnunen Haizhou Li

Voice conversion, a technique to change one’s voice to sound like that of another, poses a threat to even high performance speaker verification system. Vulnerability of text-independent speaker verification systems under spoofing attack, using statistical voice conversion technique, was evaluated and confirmed in our previous work. In this paper, we further extend the study to text-dependent sp...

Journal: :CoRR 2017
Kyle D. Wesson Jason N. Gross Todd E. Humphreys Brian L. Evans

We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming. The technique, which we call the Power-Distortion detector, classifies received signals as interference-free, multipath-afflicted, spoofed, or jammed according to observations of...

2012
Emil Kuriakose John Sumaiya Thaseen

In this age of gigabit Ethernet and broadband internet, network security has been the top priority for most of the researchers. Technology advancements have advantages as well as disadvantages. Most of the communication of present world, the e-world, takes place online, through the internet. Thus the context of network intrusions and attacks to hack into servers also came into existence. A tech...

2006
Birger Tödtmann

Forging IP source addresses (spoofing) is a common technique to conceal the origin of a network level attack in today’s best effort IP networks. In the future, IP spoofing may also directly interfere with service agreements used in quality of service (QoS) enabled IP networks because policing mechanisms located in the core cannot distinguish between malicious and benevolent packets. This reduce...

2014
Todd Humphreys Jahshan Bhatti Daniel Shepard Kyle Wesson

An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques. The testbed advances the state of the art in GNSS signal authentication by subjecting candidate techniques to the strongest publicly-acknowledged GNSS spoofing attacks. The testbed consists of a real-time phase-coherent GNSS signal simulator that act...

2014
Elie el Khoury Tomi Kinnunen Aleksandr Sizov Zhizheng Wu Sébastien Marcel

Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks. Most existing countermeasures use full knowledge of a particular VC system to detect spoofing. We study a potentially more uni...

2017
Levent Ertaul Krishnakumar Venkatachalam

Software defined networking (SDN) is a developing technology which completely changes the architecture and working of traditional networks. There has been growing urgency among networking developers to come up with a new set of devices to support Software Defined Networks and to implement better services in SDN compared to traditional networks. During these activities, security of the packets i...

Journal: :Computer Networks 2008
Craig A. Shue Minaxi Gupta Matthew P. Davy

Routers in the Internet do not perform any verification of the source IP address contained in the packets, leading to the possibility of IP spoofing. The lack of such verification opens the door for a variety of vulnerabilities, including denial-of-service (DoS) and man-in-the-middle attacks. Currently proposed spoofing prevention approaches either focus on protecting only the target of such at...

2016
Young-Seok Park Yunmok Son Hocheol Shin Dohyun Kim Yongdae Kim

Sensors measure physical quantities of the environment for sensing and actuation systems, and are widely used in many commercial embedded systems such as smart devices, drones, and medical devices because they offer convenience and accuracy. As many sensing and actuation systems depend entirely on data from sensors, these systems are naturally vulnerable to sensor spoofing attacks that use fabr...

Journal: :International Journal of Computer Applications 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید