Explore chapters and articles related to this topic
Establishing the Risk Status of the Corporate Infrastructure
Published in Dan Shoemaker, Anne Kohnke, Ken Sigler, How to Build a Cyber-Resilient Organization, 2018
Shoemaker Dan, Kohnke Anne, Sigler Ken
A spoofing attack is basically pretending to be someone or something other than who you actually are and can be a person, machine, file, website, process, or even a role. To spoof a person or user identity, attackers often take over a real email account or create a new email account, LinkedIn profile, Twitter, or Facebook profile using the victim’s information. It is imperative for applications to verify the identity of the sending or receiving host as many of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocols do not provide a mechanism for authenticating the source or destination of a message. Firewalls with deep packet inspection functionality can help mitigate a spoofing attack. Spoofing a machine can be accomplished at several layers of the Open Systems Interconnection (OSI) model such as IP address spoofing and domain name system (DNS) spoofing or DNS cache poisoning.
Privacy and Security of Data in IoT: Design Principles and Techniques
Published in Ricardo Armentano, Robin Singh Bhadoria, Parag Chatterjee, Ganesh Chandra Deka, The Internet of Things, 2017
When a malicious user impersonates the authorized user, he falsifies the data. Many of the existing IoT protocols do not authenticate the messages from a source or destination, results of which make the system more vulnerable to spoofing attacks. The spoofing attacks can be of different types like IP spoofing, e-mail spoofing, or network spoofing. To understand the concept better, let us go to reality where we get some of the phishing mails asking to update the profiles like Paypal. Many of us are aware of the fact that it is from the spoofed site. But some of us may fall into the trap of these websites and click the link to navigate to the spoofing site. This spoofing site is well designed such that it looks exactly similar to the original site. Thus, the attackers have the higher probability of stealing the sensitive information like credit or debit card details. There is a very popular spoofing occurs in the name of IP spoofing. This necessarily implies that the attacker tries to steal the information from a trusted computer network. IP spoofing is always carried out by the hacker for malicious actions. The attacker first modifies the source address field in the transmitted packet. When the destination opens up the connection for the forged source address, it can lead to a large number of attacks. This IP spoofing can be classified as many.
Introduction to Biometry
Published in Ling Guan, Yifeng He, Sun-Yuan Kung, Multimedia Image and Video Processing, 2012
Carmelo Velardo, Jean-Luc Dugelay, Lionel Daniel, Antitza Dantcheva, Nesli Erdogmus, Neslihan Kose, Rui Min, Xuran Zhao
It has been shown that conventional biometric techniques, like fingerprint or face recognition, are vulnerable to attacks. One of the most important vulnerabilities is spoofing attacks, where a person tries to masquerade as someone else by falsifying data and thereby gaining an illegitimate access to the system. Spoofing can be defined as a class of attacks on a biometric security system where a malicious individual attempts to circumvent, at the acquisition phase, the correspondence between the biometric data acquired from an individual and his/her identity. In other words, the malicious individual tries to introduce fake biometric data into a system that does not belong to that individual, either at enrollment and/or recognition [9].
Deep Learning Base Face Anti Spoofing -Convolutional Restricted Basis Neural Network Technique
Published in IETE Journal of Research, 2023
Kasetty Lakshminarasimha, V. Ponniyin Selvan
ROSE-Youtu comprises of four thousand two hundred and twenty-five clips on twenty different topics, which were received utilizing many acquisition devices including various resolutions (iPhone 5secincluding resolution of 1280_720, Huawei smartphone with 640 _480 resolution, Hasee smartphone with 640 _480 resolution), and a ZTE device with a 1280 × 720 resolution). There are majorly three spoofing attacks: masking, video reply, and printed photo attacks.