نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2014
A. S. Arora Manminder Singh

Spoofing attack is a threat for biometric authentication systems. Liveness detection aims at recognition of human physiological activities as the liveness indicator to prevent spoofing attack. Facial photograph of valid user is the most common way to spoof face recognition systems as photo attack is the cheapest and easiest spoofing approach. Antispoof problem is a challenging task before face ...

Journal: :IJIPT 2010
Zouheir Trabelsi Wassim El-Hajj

The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [man-in-the-middle attack (MiM)] and gain access to sensitive information, or perform denial of service attack (DoS) on target hosts. Several security solutions, s...

2016
Pavel Korshunov Sébastien Marcel

Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, (ii) be well-generalized for practical attacks, and (iii) be simple and efficient. Several audio-based spoofing detection methods have been p...

2014
Nicholas W. D. Evans Tomi Kinnunen Junichi Yamagishi Zhizheng Wu Federico Alegre Phillip L. De Leon

Progress in the development of spoofing countermeasures for automatic speaker recognition is less advanced than equivalent work related to other biometric modalities. This chapter outlines the potential for even state-of-the-art automatic speaker recognition systems to be spoofed. While the use of a multitude of different datasets, protocols and metrics complicates the meaningful comparison of ...

2006
Jeyanthi Hall

The need for robust access control mechanisms is paramount, especially in Wireless Local Area Network (WLAN)s and Wireless Wide Area Network (WWAN)s. Current authentication systems are vulnerable to device impersonation by rogue devices. Within cellular mobile networks, this threat is actualized by cloning cell phones, and using the clones for obtaining free services. A well known example in Wi...

Journal: :Computers & Electrical Engineering 2021

Abstract This work focuses on infiltration methods, such as Address Resolution Protocol (ARP) spoofing, where adversaries sends fabricated ARP messages, linking their Media Access Control (MAC) address to a genuine device’s Internet (IP) address. We developed Software-Defined Networking (SDN)-based Intrusion Detection and Prevention System (IDPS), which defends against spoofing Blacklisted MAC ...

Due to widespread use of Global Positioning System (GPS) in different applications, the issue of GPS signal interference cancelation is becoming an increasing concern. One of the most important intentional interferences is spoofing signals. An effective interference (delay spoof) reduction method based on adaptive filtering is developed in this paper. The principle of method is using adaptive f...

2017
Alok Pandey Jatinderkumar R. Saini

Much attention needs to be paid to different types of security threats and related attacks in the LAN and the interconnected environment. A variety of controls and counter mechanisms covering different layers of TCP/IP protocol suite are already available. But most of them have several issues related to cost, compatibility, interoperability, manageability, effectiveness etc. and hence multiple ...

Journal: :IEEE Transactions on Vehicular Technology 2023

In fifth generation (5G) new radio (NR), the demodulation reference signal (DMRS) is employed for channel estimation as part of coherent physical uplink shared channel. However, DMRS spoofing poses a serious threat to 5G NR since inaccurate will severely degrade decoding performance. this correspondence, we propose exploit spatial sparsity structure detect spoofing, which motivated by fact that...

Journal: :Speech Communication 2016
Cemal Hanilçi Tomi Kinnunen Md. Sahidullah Aleksandr Sizov

Automatic speaker verification (ASV) technology is recently finding its way to end-user applications for secure access to personal data, smart services or physical facilities. Similar to other biometric technologies, speaker verification is vulnerable to spoofing attacks where an attacker masquerades as a particular target speaker via impersonation, replay, text-to-speech (TTS) or voice convers...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید