18,766 research outputs found
Recommended from our members
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer
A portable civilian GPS spoofer is implemented on a digital
signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing. This
work is intended to equip GNSS users and receiver manufacturers
with authentication methods that are effective
against unsophisticated spoofing attacks. The work also
serves to refine the civilian spoofing threat assessment
by demonstrating the challenges involved in mounting a
spoofing attack.Aerospace Engineering and Engineering Mechanic
Anti-spoofing Methods for Automatic SpeakerVerification System
Growing interest in automatic speaker verification (ASV)systems has lead to
significant quality improvement of spoofing attackson them. Many research works
confirm that despite the low equal er-ror rate (EER) ASV systems are still
vulnerable to spoofing attacks. Inthis work we overview different acoustic
feature spaces and classifiersto determine reliable and robust countermeasures
against spoofing at-tacks. We compared several spoofing detection systems,
presented so far,on the development and evaluation datasets of the Automatic
SpeakerVerification Spoofing and Countermeasures (ASVspoof) Challenge
2015.Experimental results presented in this paper demonstrate that the useof
magnitude and phase information combination provides a substantialinput into
the efficiency of the spoofing detection systems. Also wavelet-based features
show impressive results in terms of equal error rate. Inour overview we compare
spoofing performance for systems based on dif-ferent classifiers. Comparison
results demonstrate that the linear SVMclassifier outperforms the conventional
GMM approach. However, manyresearchers inspired by the great success of deep
neural networks (DNN)approaches in the automatic speech recognition, applied
DNN in thespoofing detection task and obtained quite low EER for known and
un-known type of spoofing attacks.Comment: 12 pages, 0 figures, published in Springer Communications in Computer
and Information Science (CCIS) vol. 66
Use of supervised machine learning for GNSS signal spoofing detection with validation on real-world meaconing and spoofing data : part I
The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications. This risk consists of using manipulated GNSS data for generating a position-velocity-timing solution without the user's system being aware, resulting in presented hazardous misleading information and signal integrity deterioration without an alarm being triggered. Among the number of proposed spoofing detection and mitigation techniques applied at different stages of the signal processing, we present a method for the cross-correlation monitoring of multiple and statistically significant GNSS observables and measurements that serve as an input for the supervised machine learning detection of potentially spoofed or meaconed GNSS signals. The results of two experiments are presented, in which laboratory-generated spoofing signals are used for training and verification within itself, while two different real-world spoofing and meaconing datasets were used for the validation of the supervised machine learning algorithms for the detection of the GNSS spoofing and meaconing
Improved Secure Address Resolution Protocol
In this paper, an improved secure address resolution protocol is presented
where ARP spoofing attack is prevented. The proposed methodology is a
centralised methodology for preventing ARP spoofing attack. In the proposed
model there is a central server on a network or subnet which prevents ARP
spoofing attack.Comment: 10 pages, 15 figures, paper selected in fifth international
conference of communications security and information assurance 201
- …