Biometrics Evaluation Under Spoofing Attacks
نویسندگان
چکیده
منابع مشابه
Improving Gait Biometrics under Spoofing Attacks
Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We r...
متن کاملRevisiting Email Spoofing Attacks
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...
متن کاملBiometrics in ABC: counter-spoofing research
Automated border cont rol (ABC) is concerned with fast and secure processing for intelligence-led ident if icat ion. The FastPass proj ect aims to build a harmonised, modular reference system for future European ABC. When biometrics is taken on board as ident it y, spoofing at tacks become a concern. This paper presents current research in algorithm development for counter-spoofing at tacks in ...
متن کاملSpoofing Attacks of Domain Name System Internet
The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The j...
متن کاملSpoofing Attacks in wireless Sensor Networks
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2014
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2014.2349158