نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2015
J. Magiera R. Katulski

In this article authors present an application of spatial processing methods for GPS spoofing detection and mitigation. In the first part of this article, a spoofing detection method, based on phase delay measurements, is proposed. Accuracy and precision of phase delay estimation is assessed for various qualities of received signal. Spoofing detection thresholds are determined. Efficiency of th...

Journal: :Speech Communication 2015
Zhizheng Wu Nicholas W. D. Evans Tomi Kinnunen Junichi Yamagishi Federico Alegre Haizhou Li

While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...

2012
Simar Preet Singh A Raman Maini

The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The j...

Journal: :J. Inform. and Commun. Convergence Engineering 2014
Jung-Ha Kang Yang Sun Lee Jae Young Kim Eun-Gi Kim

Although the Internet protocol (IP) has become widely successful, it has led to many security issues. Many of these security issues are related to illegal host access. An address resolution protocol (ARP) spoofing attack is another security issue related to an illegal host access. This paper deals with the prevention of these ARP spoofing attacks. ARP provides dynamic mapping between two differ...

2012
Alok Pandey

Counter Measures to Combat Misuses of MAC Address Spoofing Techniques Alok Pandey Sr. Systems Manager, Birla Institute of Technology (Mesra), Jaipur Campus, Jaipur, Rajasthan, India Email: [email protected] Dr. Jatinderkumar R. Saini Associate Professor & I/C Director, Narmada College of Computer Application, Bharuch, Gujarat, India Email: [email protected] -----------------------...

2015
Md. Jahangir Alam Patrick Kenny Gautam Bhattacharya Themos Stafylakis

The automatic speaker verification spoofing and countermeasures challenge 2015 provides a common framework for the evaluation of spoofing countermeasures or anti-spoofing techniques in the presence of various seen and unseen spoofing attacks. This contribution proposes a system consisting of amplitude, phase, linear prediction residual, and combined amplitude phase-based countermeasures for the...

2015
Mohammad Yasinzadeh Mahdi Akhbari

Phasor measurement unit (PMU) GPS receiver spoofing has been addressed in the recent literatures. Having spoofed GPS signals, the spoofer can inject bad data into power system control center and consequently the protection system will face serious problems. The existing anti spoofing techniques are all based on GPS signal analysis and are just able to detect spoofing. However, as PMUs are place...

2013
Saeed Daneshmand Ali Jafarnia-Jahromi Ali Broumandan Gérard Lachapelle Ali Jafarnia Jahromi

Civilian GNSS signal structures are publicly known and they are received with low power on the earth surface. These make GNSS signals susceptible to spoofing attacks. Hence, the requirement for proper mitigation techniques becomes a must in current and future GNSS receivers for robust, accurate and reliable positioning. This paper proposes a new antispoofing technique using an antenna array in ...

Journal: :Adv. in Math. of Comm. 2011
Yeow Meng Chee Xiande Zhang Hui Zhang

We consider the problem of constructing optimal authentication codes with splitting. New infinite families of such codes are obtained. In particular, we establish the first known infinite family of optimal authentication codes with splitting that are secure against spoofing attacks of order two.

Journal: :CoRR 2017
Hang Hu Peng Peng Gang Wang

Email spoofing is a critical step of phishing, where the attacker impersonates someone the victim knows or trusts. In this paper, we conduct a qualitative study to explore why email spoofing is still possible after years of efforts to develop and deploy anti-spoofing protocols (e.g., SPF, DKIM, DMARC). First, we measure the protocol adoption by scanning 1 million Internet domains. We find the a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید