Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (6)

Search Parameters:
Keywords = log spoofing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
14 pages, 911 KB  
Article
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments
by Anthony J. Rose, Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov and Wayne C. Henry
J. Cybersecur. Priv. 2024, 4(2), 153-166; https://doi.org/10.3390/jcp4020008 - 25 Mar 2024
Cited by 2 | Viewed by 4501
Abstract
The Antimalware Scan Interface (AMSI) plays a crucial role in detecting malware within Windows operating systems. This paper presents ScriptBlock Smuggling, a novel evasion and log spoofing technique exploiting PowerShell and .NET environments to circumvent the AMSI. By focusing on the manipulation of [...] Read more.
The Antimalware Scan Interface (AMSI) plays a crucial role in detecting malware within Windows operating systems. This paper presents ScriptBlock Smuggling, a novel evasion and log spoofing technique exploiting PowerShell and .NET environments to circumvent the AMSI. By focusing on the manipulation of ScriptBlocks within the Abstract Syntax Tree (AST), this method creates dual AST representations, one for compiler execution and another for antivirus and log analysis, enabling the evasion of AMSI detection and challenging traditional memory patching bypass methods. This research provides a detailed analysis of PowerShell’s ScriptBlock creation and its inherent security features and pinpoints critical limitations in the AMSI’s capabilities to scrutinize ScriptBlocks and the implications of log spoofing as part of this evasion method. The findings highlight potential avenues for attackers to exploit these vulnerabilities, suggesting the possibility of a new class of AMSI bypasses and their use for log spoofing. In response, this paper proposes a synchronization strategy for ASTs, intended to unify the compilation and malware scanning processes to reduce the threat surfaces in PowerShell and .NET environments. Full article
(This article belongs to the Special Issue Intrusion, Malware Detection and Prevention in Networks)
Show Figures

Figure 1

17 pages, 7885 KB  
Article
New Acoustic Features for Synthetic and Replay Spoofing Attack Detection
by Linqiang Wei, Yanhua Long, Haoran Wei and Yijie Li
Symmetry 2022, 14(2), 274; https://doi.org/10.3390/sym14020274 - 29 Jan 2022
Cited by 22 | Viewed by 5063
Abstract
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) has become one of the most natural and convenient biometric speaker recognition approaches. However, most state-of-the-art ASV systems are vulnerable to spoofing attack techniques, such as speech synthesis, voice conversion, and [...] Read more.
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) has become one of the most natural and convenient biometric speaker recognition approaches. However, most state-of-the-art ASV systems are vulnerable to spoofing attack techniques, such as speech synthesis, voice conversion, and replay speech. Due to the symmetry distribution characteristic between the genuine (true) speech and spoof (fake) speech pair, the spoofing attack detection is challenging. Many recent research works have been focusing on the ASV anti-spoofing solutions. This work investigates two types of new acoustic features to improve the performance of spoofing attacks. The first features consist of two cepstral coefficients and one LogSpec feature, which are extracted from the linear prediction (LP) residual signals. The second feature is a harmonic and noise subband ratio feature, which can reflect the interaction movement difference of the vocal tract and glottal airflow of the genuine and spoofing speech. The significance of these new features has been investigated in both the t-stochastic neighborhood embedding space and the binary classification modeling space. Experiments on the ASVspoof 2019 database show that the proposed residual features can achieve from 7% to 51.7% relative equal error rate (EER) reduction on the development and evaluation set over the best single system baseline. Furthermore, more than 31.2% relative EER reduction on both the development and evaluation set shows that the proposed new features contain large information complementary to the source acoustic features. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

15 pages, 2825 KB  
Article
Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B
by Dustin M. Mink, Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton and Samuel Russ
Big Data Cogn. Comput. 2021, 5(2), 27; https://doi.org/10.3390/bdcc5020027 - 16 Jun 2021
Cited by 6 | Viewed by 7205
Abstract
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a data mining process, in the context of big data, to [...] Read more.
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a data mining process, in the context of big data, to determine flight patterns, including patterns for possible attacks, in the U.S. National Air Space (NAS). Flights outside the flight patterns are possible attacks. For this study, OpenSky was used as the data source of Automatic Dependent Surveillance-Broadcast (ADS-B) messages, NiFi was used for data management, Elasticsearch was used as the log analyzer, Kibana was used to visualize the data for feature selection, and Support Vector Machine (SVM) was used for classification. This research provides a solution for attack mitigation by packaging a machine learning algorithm, SVM, into an intrusion detection system and calculating the feasibility of processing US ADS-B messages in near real time. Results of this work show that ADS-B network attacks can be detected using network attack signatures, and volume and velocity calculations show that ADS-B messages are processable at the scale of the U.S. Next Generation (NextGen) Air Traffic Systems using commodity hardware, facilitating real time attack detection. Precision and recall close to 80% were obtained using SVM. Full article
Show Figures

Figure 1

20 pages, 11228 KB  
Article
Performance Evaluation of IMU and DVL Integration in Marine Navigation
by Gen Fukuda, Daisuke Hatta, Xiaoliang Guo and Nobuaki Kubo
Sensors 2021, 21(4), 1056; https://doi.org/10.3390/s21041056 - 4 Feb 2021
Cited by 23 | Viewed by 8645
Abstract
Global navigation satellite system (GNSS) spoofing poses a significant threat to maritime logistics. Many maritime electronic devices rely on GNSS time, positioning, and speed for safe vessel operation. In this study, inertial measurement unit (IMU) and Doppler velocity log (DVL) devices, which are [...] Read more.
Global navigation satellite system (GNSS) spoofing poses a significant threat to maritime logistics. Many maritime electronic devices rely on GNSS time, positioning, and speed for safe vessel operation. In this study, inertial measurement unit (IMU) and Doppler velocity log (DVL) devices, which are important in the event of GNSS spoofing or outage, are considered in conventional navigation. A velocity integration method using IMU and DVL in terms of dead-reckoning is investigated in this study. GNSS has been widely used for ship navigation, but IMU, DVL, or combined IMU and DVL navigation have received little attention. Military-grade sensors are very expensive and generally cannot be utilized in smaller vessels. Therefore, this study focuses on the use of consumer-grade sensors. First, the performance of a micro electromechanical system (MEMS)-based yaw rate angle with DVL was evaluated using 60 min of raw data for a 50 m-long ship located in Tokyo Bay. Second, the performance of an IMU-MEMS using three gyroscopes and three accelerometers with DVL was evaluated using the same dataset. A gyrocompass, which is equipped on the ship, is used as a heading reference. The results proved that both methods could achieve less than 1 km horizontal error in 60 min. Full article
(This article belongs to the Special Issue Sensors and System for Vehicle Navigation)
Show Figures

Graphical abstract

17 pages, 4887 KB  
Article
A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes
by Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Ján Gamec and Mária Gamcová
Sensors 2021, 21(2), 509; https://doi.org/10.3390/s21020509 - 13 Jan 2021
Cited by 34 | Viewed by 4632
Abstract
We consider how to protect Unmanned Aerial Vehicles (UAVs) from Global Positioning System (GPS) spoofing attacks to provide safe navigation. The Global Navigation Satellite System (GNSS) is widely used for locating drones and is by far the most popular navigation solution. This is [...] Read more.
We consider how to protect Unmanned Aerial Vehicles (UAVs) from Global Positioning System (GPS) spoofing attacks to provide safe navigation. The Global Navigation Satellite System (GNSS) is widely used for locating drones and is by far the most popular navigation solution. This is because of the simplicity and relatively low cost of this technology, as well as the accuracy of the transmitted coordinates. Nevertheless, there are many security threats to GPS navigation. These are primarily related to the nature of the GPS signal, as an intruder can jam and spoof the GPS signal. We discuss methods of protection against this type of attack and have developed an experimental stand and conducted scenarios of attacks on a drone’s GPS system. Data from the UAV’s flight log were collected and analyzed in order to see the attack’s impact on sensor readings. From this we identify a new method for detecting UAV anomalies by analyzing changes in internal parameters of the UAV. This self-diagnosis method allows a UAV to independently assess the presence of changes in its own subsystems indicative of cyber attacks. Full article
Show Figures

Figure 1

20 pages, 7718 KB  
Article
Performance Characterization of GNSS/IMU/DVL Integration under Real Maritime Jamming Conditions
by Ralf Ziebold, Daniel Medina, Michailas Romanovas, Christoph Lass and Stefan Gewies
Sensors 2018, 18(9), 2954; https://doi.org/10.3390/s18092954 - 5 Sep 2018
Cited by 33 | Viewed by 6273
Abstract
Currently Global Navigation Satellite Systems (GNSSs) are the primary source for the determination of absolute position, navigation, and time (PNT) for merchant vessel navigation. Nevertheless, the performance of GNSSs can strongly degrade due to space weather events, jamming, and spoofing. Especially the increasing [...] Read more.
Currently Global Navigation Satellite Systems (GNSSs) are the primary source for the determination of absolute position, navigation, and time (PNT) for merchant vessel navigation. Nevertheless, the performance of GNSSs can strongly degrade due to space weather events, jamming, and spoofing. Especially the increasing availability and adoption of low cost jammers lead to the question of how a continuous provision of PNT data can be realized in the vicinity of these devices. In general, three possible solutions for that challenge can be seen: (i) a jamming-resistant GNSS receiver; (ii) the usage of a terrestrial backup system; or (iii) the integration of GNSS with other onboard navigation sensors such as a speed log, a gyrocompass, and inertial sensors (inertial measurement unit—IMU). The present paper focuses on the third option by augmenting a classical IMU/GNSS sensor fusion scheme with a Doppler velocity log. Although the benefits of integrated IMU/GNSS navigation system have been already demonstrated for marine applications, a performance evaluation of such a multi-sensor system under real jamming conditions on a vessel seems to be still missing. The paper evaluates both loosely and tightly coupled fusion strategies implemented using an unscented Kalman filter (UKF). The performance of the proposed scheme is evaluated using the civilian maritime jamming testbed in the Baltic Sea. Full article
(This article belongs to the Special Issue GNSS and Fusion with Other Sensors)
Show Figures

Figure 1

Back to TopTop