Academic literature on the topic 'DNS spoofing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'DNS spoofing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "DNS spoofing"

1

Carvalho, Henrique Carlos Fonte Boa, and Eduardo Pelli. "Técnicas de reconhecimento de padrões para identificação de ataque de DNS." Revista Brasileira de Computação Aplicada 9, no. 2 (2017): 99. http://dx.doi.org/10.5335/rbca.v9i2.6279.

Full text
Abstract:
A maioria dos dispositivos conectados à Internet usufrui dos serviços de DNS (Domain Name System) para resolução de nomes de domínios. A partir da afirmação de que a maioria das redes não restringe o tráfego de pacotes destinados aos serviços de DNS, técnicas de ataques podem ser aplicadas, fazendo com que uma simples requisição de resolução de nome aparentemente normal, possa ocasionar um ataque causando diversos transtornos às vítimas. Os ataques do tipo Spoofing consistem em enganar o dispositivo do usuário, fazendo com que o computador identifique o dispositivo do usuário malicioso, de maneira confiável. Por se tratar de um tipo de ataque de alta periculosidade, devido à inexistência de pesquisas e técnicas eficientes na sua identificação, procura-se encontrar soluções viáveis para detecção deste tipo de ataque. Este trabalho teve como objetivo a aplicação de técnicas de Reconhecimento de Padrões através da aplicação das técnicas de Seleção de Características e Classificação de características para detecção de DNS Spoofing em redes locais de computadores. Foram obtidos resultados com acurácia média de 98,33% +- 0,64% na detecção na classe de falha da rede, ou seja, quando essas estavam sob ataque de DNS Spoofing.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Ya Lan, and Gui Shu Xia. "The SSL MIMT Attack with DNS Spoofing." Applied Mechanics and Materials 385-386 (August 2013): 1647–50. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1647.

Full text
Abstract:
SSL protocol is widely used in network security, such as Internet user account, electronic exchange data, etc. The SSLStrip MITM attack exist the problem of processing performance and intrusion detection. Based on the idea of network Phishing, the SSL MITM attack with the DNS spoofing resolved the above mentioned problems. The security of SSL login in daily Internet services was also analyzed, and the improvement and suggestion were provided.
APA, Harvard, Vancouver, ISO, and other styles
3

Veeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.

Full text
Abstract:
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.
APA, Harvard, Vancouver, ISO, and other styles
4

Patel, Maitri, and Rajan Patel. "Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem." Emerging Science Journal 5, no. 1 (2021): 77–84. http://dx.doi.org/10.28991/esj-2021-01259.

Full text
Abstract:
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will generate and distribute the private key to each user to decrypt a message. The thought behind presenting the scheme was to improve and reduce the complexity of certificate and key management, but it also gives rise to key escrow problem, access to encrypted information to unauthorized users. The paper represents Improved Identity-Based Encryption Scheme (IIBES) for Domain Name System (DNS) security which provides confidentiality and authentication through modified identity based encryption and identity based digital signatures. The IIBES comprises key revocation mechanism for non-revoked users and also eliminates key escrow problem. Thus, the IIBES aids to implement the identity-based cryptography more safely in reality and protects DNS against cache poisoning, spoofing attack and masquerade attack. Doi: 10.28991/esj-2021-01259 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles
5

Ilyenko, Anna, Sergii Ilyenko, and Oleksandr Vertypolokh. "METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 75–87. http://dx.doi.org/10.28925/2663-4023.2020.10.7587.

Full text
Abstract:
This article discusses further ways to protect traffic from DPI systems. The possibilities of using network protocols and application of DPI systems are investigated in the article. The analysis of the problem made it possible to identify vulnerabilities in the DNS protocol, which is based on the UDP protocol. These vulnerabilities include spoofing, interception, and traffic tethering. Also on the basis of the analysis of methods of protection of DNS traffic from interference, the authors substantiate and define the following: 1) all DNS queries are transmitted in the open; 2) existing approaches to traffic protection do not use encryption and, consequently, do not ensure the confidentiality of information; 3) there is only confirmation of the authenticity of the records. The authors have created a summary table, which identifies reliable methods of protecting DNS traffic. The authors propose the development of a full-fledged local proxy server to provide DNS traffic that can access trusted public DNS resolvers using doh and dot protocols. To understand the principles of protocol interaction, we developed our own local implementation of the main components of the network, which are most often dealt with by network users, namely: 1) web server; 2) DNS server; 3) server providing cryptographic protection and hiding open requests. The practical value of the obtained results lies in the software implementation of methods to protect traffic from DPI systems in Visual Studio Code by using the Python 3.8 programming language, which allows to provide cryptographic protection of traffic. The proposed solution of the local proxying server can be improved in the future by introducing local caching with the addition of the ability to create rules for certain domains and their subdomains. The implemented test doh server can be deployed on a trusted dedicated server outside of possible filter equipment installation points. This implementation will allow you to fully control your own traffic for resolving domain names. The authors further plan a number of scientific and technical solutions to develop and implement effective methods, tools to meet the requirements, principles and approaches to cyber security and traffic protection from interference by DPI systems in experimental computer systems and networks.
APA, Harvard, Vancouver, ISO, and other styles
6

Ranjith Kanna Kanna, Ranjith Kanna Kanna, Venkatramulu Sunkari, and Punnam Chander. "Dos and ARP Spoofing Attacks Analysis through Agent Software." Indian Journal of Applied Research 3, no. 5 (2011): 253–55. http://dx.doi.org/10.15373/2249555x/may2013/77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choi, Jun-Ho, Yong-Jin Baek, and Yeong-Geon Seo. "Poisoning Attack detection and blocking model based on ARP Spoofing tool." Journal of Digital Contents Society 22, no. 5 (2021): 809–16. http://dx.doi.org/10.9728/dcs.2021.22.5.809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bok, Jin Yeong, Kun Ha Suh, and Eui Chul Lee. "Verifying the Effectiveness of New Face Spoofing DB with Capture Angle and Distance." Electronics 9, no. 4 (2020): 661. http://dx.doi.org/10.3390/electronics9040661.

Full text
Abstract:
Face recognition is a representative biometric that can be easily used; however, spoofing attacks threaten the security of face biometric systems by generating fake faces. Thus, it is not advisable to only consider sophisticated spoofing cases, such as three-dimensional masks, because they require additional equipment, thereby increasing the implementation cost. To prevent easy face spoofing attacks through print and display, the two-dimensional (2D) image analysis method using existing face recognition systems is reasonable. Therefore, we proposed a new database called the “pattern recognition-face spoofing advancement database” that can be used to prevent such attacks based on 2D image analysis. To the best of our knowledge, this is the first face spoofing database that considers the changes in both the angle and distance. Therefore, it can be used to train various positional relationships between a face and camera. We conducted various experiments to verify the efficiency of this database. The spoofing detection accuracy of our database using ResNet-18 was found to be 96.75%. The experimental results for various scenarios demonstrated that the spoof detection performances were better for images with pinch angle, near distance images, and replay attacks than those for front images, far distance images, and print attacks, respectively. In the cross-database verification result, the performance when tested with other databases (DBs) after training with our DB was better than the opposite. The results of cross-device verification in terms of camera type showed negligible difference; thus, it was concluded that the type of image sensor does not affect the detection accuracy. Consequently, it was confirmed that the proposed DB that considers various distances, capture angles, lighting conditions, and backgrounds can be used as a training DB to detect spoofing attacks in general face recognition systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Hui Ran, and Rui Fang Ma. "Security Protocol for Electrical Remote Terminal Units." Applied Mechanics and Materials 392 (September 2013): 601–4. http://dx.doi.org/10.4028/www.scientific.net/amm.392.601.

Full text
Abstract:
We dissected disadvantages of the existing transmission protocols and improved its performance of dada communication security. We have proposed a security communication protocol, called as RTUSec, for remote terminal units. RTUSec adds a security layer to the existing three layer model, so that the data security is improved. After analyzing advantage and disadvantage of the present algorithms of cryptography and authentication for data communication, we have designed a security mechanism with DES and HMAC to deal with security problems like spoofing during the communication between Remote Terminal Units and controlling centers.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Hui Ran, and Rui Fang Ma. "A Protocol with Security Mechanism for Electrical RTU." Advanced Engineering Forum 6-7 (September 2012): 481–84. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.481.

Full text
Abstract:
We dissected disadvantages of the existing transmission protocols and improved its performance of dada communication security. We have proposed a security communication protocol, called as RTUSec, for remote terminal units. RTUSec adds a security layer to the existing three layer model, so that the data security is improved. After analyzing advantage and disadvantage of the present algorithms of cryptography and authentication for data communication, we have designed a security mechanism with DES and HMAC to deal with security problems like spoofing during the communication between RTUs and controlling centers.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "DNS spoofing"

1

Tan, Eunice Zsu. "A Quantitative Study of the Deployment of the Sender Policy Framework." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7009.

Full text
Abstract:
Email has become a standard form of communication between businesses. With the prevalent use of email as a form of communication between businesses and customers, phishing emails have emerged as a popular social engineering approach. With phishing, attackers trick users into divulging their personal information through email spoofing. Thus, it is imperative to verify the sender of an email. Anti-spoofing mechanisms such as the Sender Policy Framework (SPF) have been developed as the first line of defense against spoofing by validating the source of an email as well as the presenting options of how to handle emails that fail to validate. However, deployment of SPF policies and SPF validation remains low. To understand the cost and benefit of deploying SPF, we have developed metrics to quantify its deployment and maintenance complexity through modeling. Our approach provides a way to visualize the SPF record of a given domain through the use of a graph. Using the developed model, we applied the metrics to both the current and historical SPF policy for the Alexa Top Sites for empirical study and historical trend analysis.
APA, Harvard, Vancouver, ISO, and other styles
2

Avanzato, Simone. "Sicurezza e DNS: test di attacco e difesa." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
Il DNS, Domain Name System, è un’infrastruttura attiva da decenni ed è basilare per il corretto funzionamento di Internet, essendo il punto di collegamento tra lo spazio dei nomi di dominio e lo spazio degli indirizzi IP. Senza di esso molti servizi fra i quali mail e navigazione, non potrebbero essere utilizzati. Molte aziende, inoltre, fanno affidamento a un proprio server DNS per poter gestire al meglio il proprio dominio. Data la sua ubiquità ed essenzialità, si deve porre molta attenzione ai fattori che ne minacciano la sicurezza e in particolar modo ai crescenti attacchi informatici. Nel progetto svolto si vogliono verificare gli effetti degli attacchi più noti e frequenti in grado di compromettere un’infrastruttura DNS, studiando poi delle strategie di difesa e prevenzione che possano garantire la disponibilità del servizio e la consistenza dell’informazione trasmessa. Il primo capitolo del documento fornisce una panoramica generale sul DNS sia dal punto di vista strutturale che funzionale. Nel secondo capitolo vengono esaminate le problematiche tipiche del DNS, interne ed esterne con particolare riguardo per le varie tipologie di attacco. Per il terzo capitolo sono stati effettuati alcuni test pratici su un server DNS. Si è proceduto inizialmente con il setup dello scenario di rete, con un server DNS vittima, una macchina attaccante, la scelta dei tool e l'implementazione degli attacchi. Per ogni test effettuato, vengono riportati gli effetti sulla macchina attaccata. Infine vengono fornite diverse possibilità e metodologie di difesa, mitigazione e prevenzione. Gli attacchi scelti per i test sono DNS flood, DNS amplification e DNS spoofing tramite man-in-the-middle. Nel quarto capitolo si prende in esame un caso di attacco reale di tipo DNS flood avvenuto presso l’azienda dove è stato svolto il progetto. Viene fornita la descrizione dell’attacco, le conseguenze sui server DNS aziendali e la strategia difensiva adottata.
APA, Harvard, Vancouver, ISO, and other styles
3

Plašil, Matouš. "Soubor laboratorních úloh k demonstraci počítačových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220402.

Full text
Abstract:
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.
APA, Harvard, Vancouver, ISO, and other styles
4

Edmunds, Taiamiti. "Protection of 2D face identification systems against spoofing attacks." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT007/document.

Full text
Abstract:
Les systèmes d’identification faciale sont en plein essor et se retrouvent de plus en plus dans des produits grand public tels que les smartphones et les ordinateurs portables. Cependant, ces systèmes peuvent être facilement bernés par la présentation par exemple d’une photo imprimée de la personne ayant les droits d’accès au système. Cette thèse s’inscrit dans le cadre du projet ANR BIOFENCE qui vise à développer une certification des systèmes biométriques veine, iris et visage permettant aux industriels de faire valoir leurs innovations en termes de protection. L’objectif de cette thèse est double, d’abord il s’agit de développer des mesures de protection des systèmes 2D d’identification faciale vis à vis des attaques connues à ce jour (photos imprimées, photos ou vidéos sur un écran, masques) puis de les confronter à la méthodologie de certification développée au sein du projet ANR. Dans un premier temps, un état de l’art général des attaques et des contremesures est présenté en mettant en avant les méthodes algorithmiques (« software ») par rapport aux méthodes hardware. Ensuite, plusieurs axes sont approfondis au cours de ce travail. Le premier concerne le développement d’une contremesure basée sur une analyse de texture et le second concerne le développement d’une contre-mesure basée sur une analyse de mouvement. Ensuite, une modélisation du processus de recapture pour différencier un faux visage d’un vrai est proposée. Une nouvelle méthode de protection est développée sur ce concept en utilisant les données d'enrolment des utilisateurs et un premier pas est franchi dans la synthèse d'attaque pour un nouvel utilisateur à partir de sa donnée d'enrolment. Enfin, la méthodologie de certification développée pour les systèmes à empreintes digitales est évaluée pour les systèmes d'identification facial<br>Face identification systems are growing rapidly and invade the consumer market with security products in smartphones, computers and banking. However, these systems are easily fooled by presenting a picture of the person having legitimate access to the system. This thesis is part of the BIOFENCE project which aim to develop a certification of biometric systems in order for industrials to promote their innovations in terms of protection. Our goal is to develop new anti-spoofing countermeasures for 2D face biometric systems and to evaluate the certification methodology on protected systems. First, a general state of the art in face spoofing attack forgery and in anti-spoofing protection measures is presented. Then texture-based countermeasures and motion-based countermeasures are investigated leading to the development of two novel countermeasures. Then, the recapturing process is modelled and a new fake face detection approach is proposed based on this model. Taking advantage of enrolment samples from valid users, a first step toward the synthesis of spoofing attacks for new users is taken. Finally, the certification methodology originally developed for fingerprint technology is evaluated on face biometric systems
APA, Harvard, Vancouver, ISO, and other styles
5

Tang, Yinhang. "Contributions to biometrics : curvatures, heterogeneous cross-resolution FR and anti spoofing." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEC060/document.

Full text
Abstract:
Visage est l’une des meilleures biométries pour la reconnaissance de l’identité de personnes, car l’identification d’une personne par le visage est l’habitude instinctive humaine, et l’acquisition de données faciales est naturelle, non intrusive et bien acceptée par le public. Contrairement à la reconnaissance de visage par l’image 2D sur l’apparence, la reconnaissance de visage en 3D sur la forme est théoriquement plus stable et plus robuste à la variance d’éclairage, aux petits changements de pose de la tête et aux cosmétiques pour le visage. Spécifiquement, les courbures sont les plus importants attributs géométriques pour décrire la forme géométrique d’une surface. Elles sont bénéfiques à la caractérisation de la forme du visage qui permet de diminuer l’impact des variances environnementales. Cependant, les courbures traditionnelles ne sont définies que sur des surfaces lisses. Il est donc nécessaire de généraliser telles notions sur des surfaces discrètes, par exemple des visages 3D représenté par maillage triangulaire, et d’évaluer leurs performances en reconnaissance de visage 3D. En outre, même si un certain nombre d’algorithmes 3D FR avec une grande précision sont disponibles, le coût d’acquisition de telles données de haute résolution est difficilement acceptable pour les applications pratiques. Une question majeure est donc d’exploiter les algorithmes existants pour la reconnaissance de modèles à faible résolution collecté avec l’aide d’un nombre croissant de caméras consommateur de profondeur (Kinect). Le dernier problème, mais non le moindre, est la menace sur sécurité des systèmes de reconnaissance de visage 3D par les attaques de masque fabriqué. Cette thèse est consacrée à l’étude des attributs géométriques, des mesures de courbure principale, adaptées aux maillages triangulaires, et des schémas de reconnaissance de visage 3D impliquant des telles mesures de courbure principale. En plus, nous proposons aussi un schéma de vérification sur la reconnaissance de visage 3D collecté en comparant des modèles de résolutions hétérogènes équipement aux deux résolutions, et nous évaluons la performance anti-spoofing du système de RF 3D. Finalement, nous proposons une biométrie système complémentaire de reconnaissance veineuse de main basé sur la détection de vivacité et évaluons sa performance. Dans la reconnaissance de visage 3D par la forme géométrique, nous introduisons la généralisation des courbures principales conventionnelles et des directions principales aux cas des surfaces discrètes à maillage triangulaire, et présentons les concepts des mesures de courbure principale correspondants et des vecteurs de courbure principale. Utilisant ces courbures généralisées, nous élaborons deux descriptions de visage 3D et deux schémas de reconnaissance correspondent. Avec le premier descripteur de caractéristiques, appelé Local Principal Curvature Measures Pattern (LPCMP), nous générons trois images spéciales, appelée curvature faces, correspondant à trois mesures de courbure principale et encodons les curvature faces suivant la méthode de Local Binary Pattern. Il peut décrire la surface faciale de façon exhaustive par l’information de forme locale en concaténant un ensemble d’histogrammes calculés à partir de petits patchs dans les visages de courbure. Dans le deuxième système de reconnaissance de visage 3D sans enregistrement, appelée Principal Curvature Measures based meshSIFT descriptor (PCM-meshSIFT), les mesures de courbure principales sont d’abord calculées dans l’espace de l’échelle Gaussienne, et les extrèmes de la Différence de Courbure (DoC) sont définis comme les points de caractéristique. Ensuite, nous utilisons trois mesures de courbure principales et leurs vecteurs de courbure principaux correspondants pour construire trois descripteurs locaux pour chaque point caractéristique, qui sont invariants en rotation. [...]<br>Face is one of the best biometrics for person recognition related application, because identifying a person by face is human instinctive habit, and facial data acquisition is natural, non-intrusive, and socially well accepted. In contrast to traditional appearance-based 2D face recognition, shape-based 3D face recognition is theoretically more stable and robust to illumination variance, small head pose changes, and facial cosmetics. The curvatures are the most important geometric attributes to describe the shape of a smooth surface. They are beneficial to facial shape characterization which makes it possible to decrease the impact of environmental variances. However, exiting curvature measurements are only defined on smooth surface. It is required to generalize such notions to discrete meshed surface, e.g., 3D face scans, and to evaluate their performance in 3D face recognition. Furthermore, even though a number of 3D FR algorithms with high accuracy are available, they all require high-resolution 3D scans whose acquisition cost is too expensive to prevent them to be implemented in real-life applications. A major question is thus how to leverage the existing 3D FR algorithms and low-resolution 3D face scans which are readily available using an increasing number of depth-consumer cameras, e.g., Kinect. The last but not least problem is the security threat from spoofing attacks on 3D face recognition system. This thesis is dedicated to study the geometric attributes, principal curvature measures, suitable to triangle meshes, and the 3D face recognition schemes involving principal curvature measures. Meanwhile, based on these approaches, we propose a heterogeneous cross-resolution 3D FR scheme, evaluate the anti-spoofing performance of shape-analysis based 3D face recognition system, and design a supplementary hand-dorsa vein recognition system based on liveness detection with discriminative power. In 3D shape-based face recognition, we introduce the generalization of the conventional point-wise principal curvatures and principal directions for fitting triangle mesh case, and present the concepts of principal curvature measures and principal curvature vectors. Based on these generalized curvatures, we design two 3D face descriptions and recognition frameworks. With the first feature description, named as Local Principal Curvature Measures Pattern descriptor (LPCMP), we generate three curvature faces corresponding to three principal curvature measures, and encode the curvature faces following Local Binary Pattern method. It can comprehensively describe the local shape information of 3D facial surface by concatenating a set of histograms calculated from small patches in the encoded curvature faces. In the second registration-free feature description, named as Principal Curvature Measures based meshSIFT descriptor (PCM-meshSIFT), the principal curvature measures are firstly computed in the Gaussian scale space, and the extremum of Difference of Curvautre (DoC) is defined as keypoints. Then we employ three principal curvature measures and their corresponding principal curvature vectors to build three rotation-invariant local 3D shape descriptors for each keypoint, and adopt the sparse representation-based classifier for keypoint matching. The comprehensive experimental results based on FRGCv2 database and Bosphorus database demonstrate that our proposed 3D face recognition scheme are effective for face recognition and robust to poses and occlusions variations. Besides, the combination of the complementary shape-based information described by three principal curvature measures significantly improves the recognition ability of system. To deal with the problem towards heterogeneous cross-resolution 3D FR, we continuous to adopt the PCM-meshSIFT based feature descriptor to perform the related 3D face recognition. [...]
APA, Harvard, Vancouver, ISO, and other styles
6

Marček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.

Full text
Abstract:
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
APA, Harvard, Vancouver, ISO, and other styles
7

Kose, Neslihan. "Leurrage et dissimulation en reconnaissance faciale : analyses et contre attaques." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0020/document.

Full text
Abstract:
La Reconnaissance automatique des personnes est devenue un sujet de plus en plus important avec l'augmentation constante des besoins en sécurité. De nombreux systèmes biométriques existent. Ils utilisent différentes caractéristiques humaines. Parmi tous les traits biométriques, la reconnaissance faciale inclut des aspects positifs en termes d'accessibilité et de fiabilité. Dans cette thèse, deux défis en reconnaissance faciales sont étudiés. Le premier est le leurrage. Le leurrage en reconnaissance faciale est présenté. Des contre-mesures permettant d'améliorer les systèmes actuels sont proposés. A cet effet, les attaques basées sur des photographies 2D ou des masques 3D sont analysées. Le second défi exploré dans cette thèse est lié aux variations dues à des altérations du visage (i.e. chirurgie plastique), maquillage et accessoires pour le visage (e.g. occultations par la présence de lunettes). L'impact de ces variations en reconnaissance de visage est étudiée séparément. Ensuite, des techniques robustes contre les variations de camouflage sont proposées<br>Human recognition has become an important topic as the need and investments for security applications grow continuously. Numerous biometric systems exist which utilize various human characteristics. Among all biometrics traits, face recognition is advantageous in terms of accessibility and reliability. In the thesis, two challenges in face recognition are analyzed. The first one is face spoofing. Spoofing in face recognition is explained together with the countermeasure techniques that are proposed for the protection of face recognition systems against spoofing attacks. For this purpose, both 2D photograph and 3D mask attacks are analyzed. The second challenge explored in the thesis is disguise variations, which are due to facial alterations, facial makeup and facial accessories (occlusions). The impact of these disguise variations on face recognition is explored, separately. Then, techniques which are robust against disguise variations are proposed
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "DNS spoofing"

1

Russel, Ryan. Die Hacker-Bibel: [die Kunst des diffing, sniffing und spoofing ; Format String-Schwachstellen ; Buffer-overflow-Angriffe]. 2nd ed. Mitp, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "DNS spoofing"

1

Moriyama, Eimatsu, Takeshi Takahashi, and Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks." In Neural Information Processing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bai, Xiaolong, Liang Hu, Zixing Song, Feiyan Chen, and Kuo Zhao. "Defense against DNS Man-In-The-Middle Spoofing." In Web Information Systems and Mining. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23971-7_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Miscellaneous Tools." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch010.

Full text
Abstract:
This chapter discusses different essential ethical hacking tools developed by various researchers in detail. Tools discussed here include Netcat network analysis tool, Macof from Dsniff suit toolset for DOS attack, Yersinia for dhcp starvation attack, Dnsspoof tool for MITM attacks, Ettercap for network-based attacks, Cain and Abel, Sslstrip tool, and SEToolkit. These tools are used for carrying out DOS attack, DHCP starvation attack, DNS spoofing attack, session hijacking attacks, social engineering attacks, and many other network-based attacks. Also, the detailed steps to configure WAMP server as part of ethical hacking lab setup is also discussed in this chapter in order to simulate web application-based attacks. There are large numbers of ethical hacking tools developed by the researchers working in this domain for computer security, network security, and web server security. This chapter discusses some of the essential tools in detail.
APA, Harvard, Vancouver, ISO, and other styles
4

Dhanalakshmi, Ranaganayakulu, and Chenniappan Chellappan. "Fraud and Identity Theft Issues." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch014.

Full text
Abstract:
Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain. In spite of the different possible attacks discussed in later chapters, this chapter can focus on phishing attacks – a form of indirect attacks– such as an act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, et cetera. The vulnerabilities on various phishing methods such as domain name spoofing, URL obfuscation, susceptive e-mails, spoofed DNS and IP addresses, and cross site scripting are analyzed, and the chapter concludes that an integrated approach is required to mitigate phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

L., Kavisankar, Chellappan C., and Poovammal E. "Against Spoofing Attacks in Network Layer." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.

Full text
Abstract:
In the context of network security, a spoofing attack is a condition in which one person or a program successfully masquerades as another. This is done by providing counterfeit data with the malicious intention of gaining an illegitimate advantage. Spoofing attack which may be generated in various layer of Open Systems Interconnection model (OSI model) is discussed in this chapter. The chapter ends with discussing about the possible spoofing attacks in network layer and the relevant defense mechanism of the same. The detailed analysis and discussion is made on the spoofing attack over the Network layer because, Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks more devastating while using network protocol like Internet Protocol (IP) which have become more of a threat than ever for the past few years.
APA, Harvard, Vancouver, ISO, and other styles
6

Shamsolmoali, Pourya, Masoumeh Zareapoor, and M. Afshar Alam. "Multi-Aspect DDOS Detection System for Securing Cloud Network." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch096.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security and Cloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service) attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defending methods do not able to disguises the real location of the attack. Therefore, DDoS attack is the most significant challenge for network. In this chapter we present different aspect of security in Cloud Computing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacks and discussed the most effective detection methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Shamsolmoali, Pourya, Masoumeh Zareapoor, and M. Afshar Alam. "Multi-Aspect DDOS Detection System for Securing Cloud Network." In Handbook of Research on End-to-End Cloud Computing Architecture Design. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0759-8.ch010.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security and Cloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service) attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defending methods do not able to disguises the real location of the attack. Therefore, DDoS attack is the most significant challenge for network. In this chapter we present different aspect of security in Cloud Computing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacks and discussed the most effective detection methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Stevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch041.

Full text
Abstract:
Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.
APA, Harvard, Vancouver, ISO, and other styles
9

Stevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Networking and Telecommunications. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch093.

Full text
Abstract:
Voice over Internet Protocol (VoIP) networks signal an evolution in telecommunications that is accelerating the convergence of the Internet and the public switched telephone network (PSTN). Offering decreased costs and other benefits, VoIP is poised to transform telecommunications and the organizations that use them. However, some consider VoIP a security nightmare, combining the worst vulnerabilities of IP networks and voice networks. DOS attacks, crash attacks, packet spoofing, buffer overflow attacks, spam over Internet telephony (SPIT), and word injection all pose threats to commercial enterprise networks and the mission critical operations that they support.
APA, Harvard, Vancouver, ISO, and other styles
10

Verma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) and it is considered as a substantial component of Intelligent Transportation System (ITS). DoS attacks on VANET are varying and may be overwhelmed by VANET protocols, such as TCP or UDP flooding attacks. Different secure communications models can be used to detect and prevent IP spoofing DoS attacks, by which the attacks are committed by fraudulent and malicious nodes. In this chapter, an efficient detection method has been proposed to detect UDP flooding attacks, called Bloom-Filter-Based IP-CHOCK (BFICK). A prevention method using IP-CHOCK has also been proposed to prevent DoS, called Reference Broadcast Synchronization (RBS). In principle, the combined method is based on the IP-CHOCK filter concept of packets during an attack incident and with busy traffic condition. Fake identities from malicious vehicles can be analyzed with help of the existing reliable IP addresses. Beacon packets were exchanged periodically by all the vehicles to announce their presence and to forward it to the next node.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "DNS spoofing"

1

Sahri, Nm, and Koji Okamura. "Protecting DNS services from IP spoofing." In CFI '16: The 11th International Conference on Future Internet Technologies. ACM, 2016. http://dx.doi.org/10.1145/2935663.2935666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maksutov, Artem A., Ilya A. Cherepanov, and Maksim S. Alekseev. "Detection and prevention of DNS spoofing attacks." In 2017 Siberian Symposium on Data Science and Engineering (SSDSE). IEEE, 2017. http://dx.doi.org/10.1109/ssdse.2017.8071970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hussain, Mohammed Abdulridha, Hai Jin, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Salah H. Abbdal, and Ayad Ibrahim. "DNS Protection against Spoofing and Poisoning Attacks." In 2016 3rd International Conference on Information Science and Control Engineering (ICISCE). IEEE, 2016. http://dx.doi.org/10.1109/icisce.2016.279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tripathi, Nikhil, Mayank Swarnkar, and Neminath Hubballi. "DNS spoofing in local networks made easy." In 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, 2017. http://dx.doi.org/10.1109/ants.2017.8384122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abdelmajid, Nabih, Anang Amin, and Shehab A. R. Farhan. "Location Based Model For Prevention DNS Spoofing." In ICICSE '20: 2020 International Conference on Internet Computing for Science and Engineering. ACM, 2020. http://dx.doi.org/10.1145/3424311.3424329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sahri, NM, and Koji Okamura. "Collaborative Spoofing Detection and Mitigation -- SDN Based Looping Authentication for DNS Services." In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2016. http://dx.doi.org/10.1109/compsac.2016.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barbhuiya, F. A., S. Biswas, and S. Nandi. "An active DES based IDS for ARP spoofing." In 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2011. http://dx.doi.org/10.1109/icsmc.2011.6084088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barbhuiya, Ferdous A., Santosh Biswas, Neminath Hubballi, and Sukumar Nandi. "A host based DES approach for detecting ARP spoofing." In 2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci. IEEE, 2011. http://dx.doi.org/10.1109/cicybs.2011.5949401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mustafa, Hossen, Wenyuan Xu, Ahmad Reza Sadeghi, and Steffen Schulz. "You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks." In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2014. http://dx.doi.org/10.1109/dsn.2014.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Neminath, H., S. Biswas, S. Roopa, et al. "A DES approach to intrusion detection system for ARP spoofing attacks." In Automation (MED 2010). IEEE, 2010. http://dx.doi.org/10.1109/med.2010.5547790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography