Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter September 12, 2014

On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal

  • Zouheir Trabelsi EMAIL logo , Mohamed Al Hemairy and Mohammad M. Masud

Abstract

Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances deteriorate significantly once they are under DoS attacks. Finally, the article lists some security consideration that should be taken into consideration when designing secure biometrics readers.

1 Introduction

It is unquestionable that the use of biometric technologies is becoming increasingly common. Nowadays, biometrics readers, such as fingerprint, face, and iris, are deployed in many public sites and are used for user identification and verification. They play an important role in implementing the security policies within institutions.

Biometric reader manufacturers have been focusing on offering easy-to-use and practical devices with effective costs, low enrollment and recognition time, and low rate of false match and non-match. Currently, most biometrics readers are able to connect to wired and wireless networks and communicate with remote biometric servers to exchange biometric data. However, since these devices are as any network host with IP and MAC addresses, they may be the targets of malicious network users.

In fact, it is unquestionable that biometric readers should be robust enough against network attacks to rely on them while building secure networks and applications. That is, biometric readers should be able to thwart common network attacks; otherwise, they can be easy targets for malicious users. Also, in case of network attacks, the biometric readers’ logs and the biometric data should be available to assist in investigating the nature and sources of the attacks. However, unsecure and vulnerable biometric readers may not contribute in finding exactly what happened on the target systems. Therefore, it is important to acquire sufficient knowledge about the security robustness of both biometric readers and the exchanged biometric data prior to designing and implementing networks and applications that use biometric technologies.

In this article, we investigated the effect of common network attacks on the performance of several fingerprint and iris readers. Practically, experiments are conducted using denial of service (DoS) attacks and ARP cache poisoning attack. The experiments consist mainly into launching several types of network attacks targeting biometric readers and then studying the robustness of the tested readers against the attacks by analyzing their response time and their ability to continue communicating properly with other network devices while they are under attacks.

The remainder of this article is organized as follows. Section 2 introduces the network attacks that have been used during the experiments. Section 3 presents an overview of the biometrics readers that have been tested. Then, in Section 4, we present and analyze the experiments results related to the resilience of the tested biometrics readers against the network attacks. Section 5 lists some security consideration that should be taken into consideration when designing secure biometric readers. Finally, Section 6 concludes the article.

2 Background: DoS and ARP Cache Poisoning Attacks

The investigation conducted in this article uses common DoS attacks to evaluate the resilience of several fingerprint and iris readers against these attacks. Also, we investigated the ability of ARP cache poisoning attack to corrupt the ARP cache entries of the biometrics readers. Hosts with corrupted ARP caches are usually unable to communicate properly with the other network hosts [16]. Consequently, a DoS situation may emerge from corrupting the ARP caches of target network hosts.

2.1 DoS Attacks

Commonly, a DoS attack attempts to render a system unusable or significantly slows down the system for legitimate users by overloading the resources so no one else can access it. A DoS attack may target a user, to prevent him from making outgoing connections on the network. A DoS attack may also target an entire organization, to either prevent outgoing traffic or to prevent incoming traffic to certain network services, such as the organization webpage.

DoS attacks are much easier to accomplish than remotely gaining administrative access to a target system. Because of this, DoS attacks have become very common on the Internet. A DoS attack can either be deliberate or accidental. It is caused deliberately when an unauthorized user actively overloads a resource. It is caused accidentally when an authorized user unintentionally does something that causes resources to become unavailable.

Most DoS attacks rely upon weaknesses in the TCP/IP protocols. The next subsections introduce the selected common DoS attacks used in this article’s experiments, namely the SYN flood, Land, Teardrop, and UDP flood attacks.

2.1.1 Land Attack

Land attack occurs when an attacker sends spoofed TCP SYN packets (connection initiation) with the target host’s IP address and an open port as both source and destination. The target host responds by sending the SYN-ACK packet to itself, creating an empty connection that lasts until the idle timeout value is reached. Flooding a system with such empty connections can overwhelm the system, causing a DoS (Figure 1) situation.

Figure 1 The Land Attack.
Figure 1

The Land Attack.

2.1.2 SYN Flood Attack

A SYN flood occurs when a host becomes so overwhelmed by SYN packets initiating incomplete connection requests that it can no longer process legitimate connection requests.

When a client system attempts to establish a TCP connection to a system providing a service (the server), the client and server exchange a sequence set of messages known as a three-way handshake. In fact, the client system begins by sending a SYN (synchronization) message to the server. The server then acknowledges the SYN message by sending a SYN-ACK (acknowledgment) message to the client. The client then finishes establishing the connection by responding with an ACK message. The connection between the client and the server is then opened, and the service-specific data can be exchanged between the client and the server.

The potential for abuse arises at the point where the server system has sent an acknowledgment (SYN-ACK) back to the client, but it has not yet received the final ACK message. This is what meant by a half-opened connection. The server has in its system memory a built-in data structure describing all pending connections. This data structure is of finite size, and it can be made to overflow by intentionally creating too many partially opened connections (Figure 2).

Figure 2 The SYN Flood Attack.
Figure 2

The SYN Flood Attack.

Creating half-opened connection is easily accomplished with IP spoofing. The attacker’s system sends SYN messages to the victim’s server that appear to be legitimate, but in fact, the source address is spoofed to a system that is not currently connected to the network. This means that the final ACK message is never sent to the victim server. Because the source address is spoofed, there is no way to determine the identity of the true attacker when the packet arrives at the victim’s system.

2.1.3 Teardrop Attack

Teardrop attack target vulnerability in the way fragmented IP packets are reassembled. Fragmentation is necessary when IP datagrams are larger than the maximum transmission unit of a network segment across which the datagrams must traverse. To successfully reassemble packets at the receiving end, the IP header for each fragmented packet includes an offset to identify the fragment’s position in the original unfragmented packet. In a Teardrop attack, packet fragments are deliberately fabricated with overlapping offset fields, causing the host to hang or crash when it tries to reassemble them. Figure 3 shows that the second fragment packet purports to begin 20 bytes earlier (at 800) than the first fragment packet ends (at 820). The offset of fragment packet 2 is not in accord with the packet length of fragment packet 1. This discrepancy can cause some systems to crash during the reassembly attempt.

Figure 3 The Teardrop Attack.
Figure 3

The Teardrop Attack.

2.1.4 UDP Flood Attack

UDP is a connectionless protocol, and it does not require any connection setup procedure to transfer data. A UDP flood attack is possible when an attacker sends a UDP packet to a random port on the victim system. When the victim system receives a UDP packet, it will determine what application is waiting on the destination UDP port. Two cases are possible. If there is no application that is waiting on the port (closed UDP port), the victim host will generate an ICMP packet of destination unreachable to the forged source address. However, if there is an application running on the destination UDP port, then the application will handle the UDP packet. In both cases, if enough UDP packets are delivered to destination UDP ports, the victim host or application may slow down or go down (Figure 4).

Figure 4 UDP Flood Attack.
Figure 4

UDP Flood Attack.

2.2 ARP Cache Poisoning Attack

Sniffing attack consists of rerouting (redirecting) the network traffic between two target hosts to a malicious host. Then, the malicious host will forward the received packets to the original destination, so that the communication between the two target hosts is not interrupted and the two communicating hosts will not notice that their traffic is being sniffed by a malicious one.

The Man-in-the-Middle attack (MiM) is the most common attack used to sniff switched local area networks (LANs). MiM attack is based on corrupting the ARP caches of target hosts using ARP cache poisoning attack [16]. ARP cache poisoning attack is the malicious act, by a host in a LAN, of introducing a spurious IP address to MAC address mapping in another host’s ARP cache. This can be done by manipulating directly the ARP cache of a target host, independently of the ARP messages sent by the target host. To do that, the malicious host can either add a new fake entry in the target host’s ARP cache or update an already existing entry by fake IP and MAC addresses.

In an MiM attack, the malicious user first enables the host’s IP packet routing to become a router and be able to forward the redirected packets. Then, using the ARP cache poisoning attack, the malicious host corrupts the ARP caches of the two target hosts to force the two hosts to forward all their packets to the malicious host. It is important to notice that if the malicious host corrupts the ARP caches of the two target hosts without enabling its IP packet routing, then the two hosts will not be able to exchange packets and it will be a DoS attack. In this case, the malicious host does not forward the received packets to their legitimate destination as shown in Figure 5.

Figure 5 Biometric Data Sniffing Based on the MiM Attack.
Figure 5

Biometric Data Sniffing Based on the MiM Attack.

3 Biometrics Readers

In 2001, the MIT Technology Review [6] named biometrics as one of the “top ten emerging technologies that will change the world”. The term “biometric” comes from the Greek words “bio” (life) and “metric” (to measure). Biometrics refer to technologies used for measuring and analyzing a person’s unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification, whereas physical biometrics can be used for either identification or verification.

Identification is determining who a person is. It involves trying to find a match for a person’s biometric data in a database containing records of biometric information about people. This method requires time and a large amount of processing power, especially if the database is very large. Verification is determining if a person is who he/she say he/she really is. It involves comparing a user’s biometric data with the previously recorded data for that person to ensure that this is the same person. This method requires less processing power and time and is usually used for authentications and access control.

The main physical biometrics technologies include fingerprint, iris, retina, hand geometry, and face features [17, 18]. There are also a number of behavioral biometric technologies such as voice recognition (analyzing a speaker’s vocal behavior), keystroke patterns (measuring the time spacing of typed words), gait recognition (manner of walking), or signature (analyzing the way you sign). Other biometric techniques still in exploratory stages include DNA biometrics, ear shape, fingernails, and odor [17].

The most common types of biometric technologies are fingerprint, iris, voice, hand geometry, and face recognition [2, 5, 17, 18]. Yet, there is not one single biometric technology that would be ideal for all applications. Each technology has its own benefits and weaknesses. Nowadays, fingerprint and iris technologies are widely used [1] because they are fast, reliable, stable, cost effective, and provide excellent identification accuracy rates. Iris recognition is the most precise of all biometric identification systems. The false-acceptance ratio is so low that the probability of falsely identifying one individual as another is virtually zero [4]. For these reasons, this article is focusing on investigating the effect of common network DoS attacks on solely fingerprint and iris readers.

4 Robustness of Biometric Readers Against DoS Attacks: Experiments

To investigate the robustness of fingerprint and iris readers against DoS attacks, two laboratory experiments are conducted using DoS attack generation tools. Practically, we investigated the effect of four common DoS attacks on the performance of several fingerprint and iris readers. In addition, we investigated the effect of ARP cache poisoning attack on the entries of the ARP caches of the readers.

The proposed experimental method consists mainly into launching first several types of network DoS attacks targeting fingerprint and iris readers and then studying the robustness of the readers by analyzing their response time and their ability to continue communicating properly with other network devices while they are under attacks.

4.1 Network Architecture

Figure 6 shows the network architecture used in the experiments. A DoS attack generator host, a biometric server, a fingerprint reader, and an iris reader are connected to a switch.

Figure 6 Network Architecture.
Figure 6

Network Architecture.

4.2 DoS Attack Tools

The tools used to generate the DoS attacks are

  • FrameIP packet generator [8] and CommView Visual Packet Builder [3] are packet generators that allow generating IP and ARP packets. The tools can be used by the attack host to generate the Land, Teardrop, and UDP flood attacks as well as to perform ARP cache poisoning attack.

  • The SYNflood tool [15] is a ready-to-use attack tool used to generate the SYN flood attack.

4.2.1 Building Land Attack Packets

The user can use a packet generator tool to build packets that produce the Land attack. For example, the user can use an online command tool, such as FrameIP Packet Generator, or a more friendly and easy to use GUI tool, such as CommView Visual Packet builder.

In this article, CommView Visual Packet Builder is used to generate Land attack. Figure 7 shows a screenshot of how a spoofed TCP SYN packet is used to build a Land attack packet. The packet has the source IP address set to the destination IP address, and the source port number is set to the destination port number.

Figure 7 A Land Attack Packet Built Using CommView Visual Packet Builder.
Figure 7

A Land Attack Packet Built Using CommView Visual Packet Builder.

4.2.2 Building Teardrop Attack Packets

To generate a Teardrop attack, two fragmented packets have to be built. The packets belong to the same original packet and have the same IP identification (ID). The field ID includes an identifying value assigned by the sender host to aid in assembling the fragments of a datagram. However, the two fragmented packets have overlapping offset values.

Using CommView Visual Packet Builder, Figures 8 and 9 show the two example fragmented packets with overlapped offset values leading to the Teardrop attack.

Figure 8 The First Fragment Packet of a Teardrop Attack.
Figure 8

The First Fragment Packet of a Teardrop Attack.

Figure 9 The Second Fragment Packet of a Teardrop Attack.
Figure 9

The Second Fragment Packet of a Teardrop Attack.

4.2.3 Building UDP Flood Attack Packets

In an UDP flood attack packet, the source IP address should be set to a spoofed or random IP address. The destination port should be set to a number of an open UDP port in the victim host.

There are many available ready-to-use UDP flood attack tools. First, the attacker can use any port scanner tool to identify the list of open UDP ports at the victim host. Then, one open UDP port number is selected and is used as the destination port number in the UDP flood attack packets. For example, Figure 10 shows a screenshot of the result of a UDP port scanning of a target host, using Fast Port Scanner tool [7].

To build UDP flood attack packets, the user has to use a packet builder tool that allows including spoofed or random IP addresses in the source IP field of the IP header. Random or spoofed source IP addresses allow hiding the real source IP address of the attacker host.

Figure 10 UDP Port Scanning Using Fast Port Scanner Tool.
Figure 10

UDP Port Scanning Using Fast Port Scanner Tool.

FrameIP Packet Generator has the ability to generate UDP packets with random or spoofed source IP addresses. Figure 11 is a screenshot of the online command of FrameIP that allows generating UDP flood traffic to the destination UDP port 53 of the target host with IP address 192.168.2.4.

Figure 11 Frameip’s Online Command for Generating UDP Flood Traffic.
Figure 11

Frameip’s Online Command for Generating UDP Flood Traffic.

4.2.4 Building SYN Flood Attack Packets

There are many available ready-to-use SYN flood attack tools. As an example, Figure 12 shows the online command used to generate the SYN flood attack, using the tool SYNflood. After executing the online command, a flood of fake TCP SYN packets is sent to the target biometric reader whose IP address is 10.10.10.5.

Figure 12 The SYN Flood Attack Online Command.
Figure 12

The SYN Flood Attack Online Command.

During the experiment, all above four DoS attacks (Land, Teardrop, UDP flood, and SYN flood attacks) are launched simultaneously to increase their effect. The following section presents the result of the experiments.

4.3 DoS Attacks Results for Fingerprint Readers

In this experiment, we tested three fingerprint readers:

  • NitGen Fingerprint reader NAC 3000 [13]

  • F7 Standalone Biometric Access Control Terminal [9]

  • MX600 Fingerprint Access Control [12]

Table 1 summarizes the experiments results for each fingerprint reader. The DoS attacks had a negative effect on the readers’ performance. That is, few seconds after launching the DoS attacks, the recognition performances of all tested fingerprint readers deteriorated significantly. Practically, the recognition status of the readers became unstable under the DoS attacks. In fact, the readers’ recognition response was very slow or there was no response to ping requests. In addition, the biometrics readers often disconnected from the network, especially when the attack traffic rate increase significantly.

Table 1

DoS Attacks Results for Fingerprint Readers.

Fingerprint readersEffect of DoS attacks on the recognition performance of the fingerprint readers
NitGen Fingerprint reader NAC 3000Recognition status is unstable:
F7 Standalone Biometric Access Control Terminal MX600 Fingerprint Access Control– The reader recognition response is very slow or there is no response to ping requests.
– The readers often disconnect from the network.

For example, Figure 13 shows that before launching the DoS attacks, the response times were <0.4 ms when pinging the NitGen Fingerprint reader NAC 3000. However, the response times increased considerably and reached more than 20 ms just after launching the attacks. This is because after launching the DoS attacks, the fingerprint reader became overloaded with treating the flood of packets and consequently became unable to process the ping requests instantly. In fact, DoS attacks have usually a major negative effect on victim system’s performance by making their processors heavily loaded with processing malicious requests, resulting into delaying the processing of legitimate requests that do not intend to harm the system’s performance.

Figure 13 Response Time of Nitgen Fingerprint Reader NAC 3000 Before and During the DoS Attacks.
Figure 13

Response Time of Nitgen Fingerprint Reader NAC 3000 Before and During the DoS Attacks.

4.4 DoS Attacks Results for Iris Readers

In this experiment, we tested three iris readers:

  • Panasonic Iris reader BM-ET330 [14]

  • LG’s IrisAccess 4000 [11]

  • IG-AD100® Iris Camera System [10]

Table 2 summarizes the experiments results for each iris reader. As for the case of fingerprint readers, the DoS attacks had a negative effect on the readers’ performance. Few seconds after launching the DoS attacks, the recognition performances of all tested iris readers deteriorated significantly. Practically, the recognition status of the readers became unstable under the DoS attacks. In fact, the reader recognition response was very slow or there was no response. The readers disconnected from the network, but when the DoS attacks stopped, the iris readers reconnected again to the network.

Table 2

DoS Attacks Results for Iris Readers.

Iris readersEffect of DoS attacks on the recognition performance of the iris readers
Panasonic Iris reader BM-ET330Recognition status is unstable:
LG’s IrisAccess 4000– The reader recognition response is very slow or there is no response to ping requests.
IG-AD100® Iris Camera System– The readers disconnected from the network, but when the DoS attack stopped, the readers reconnected to the network.

For example, Figure 14 shows that before launching the DoS attacks, the response times were <0.1 ms when pinging the Panasonic Iris reader BM-ET330 [14]. However, just after launching the attacks, the reader crashed, and consequently, there were no ping responses. The reader became unable to recognize users and completely disconnected from the network. When the DoS attack stopped, the reader reconnected to the network.

Figure 14 Response Time of Panasonic Iris Reader BM-ET330 Before and After the DoS Attacks.
Figure 14

Response Time of Panasonic Iris Reader BM-ET330 Before and After the DoS Attacks.

4.5 ARP Cache Poisoning Attack Results

This attack consists into attempting to corrupt the ARP caches of the fingerprint and iris readers. Network hosts with corrupted ARP caches may not be able to communicate properly with other network hosts. For example, the following shows the contents of an ARP request packet that intends to corrupt an ARP entry of a target biometric reader with a fake IP/MAC entry:

ARP header
 Operation1 (ARP request)
 Source IP addressIP of a network host
 Source MAC addressFake MAC address
 Destination IP addressAny address
 Destination MAC address00:00:00:00:00:00
Ethernet header
 Source MAC addressAny address
 Destination MAC addressMAC address of the target biometric reader
 TypeARP (0x0806)

As an example, CommView Visual Packet Builder tool is used to build such a fake ARP request packet, as shown in Figure 15. In fact, the sender address IP (192.168.1.100) is assigned a fake MAC address (01.01.01.01.01.01). Hence, if the target reader is vulnerable to ARP cache poisoning attack, this fake ARP request will allow creating fake IP/MAC entry in the target reader’s ARP cache. Consequently, the target reader will not be able to communicate properly with the host whose IP address is specified in the fake IP/MAC entry.

Figure 15 ARP Cache Poisoning Packet Generation Using CommView Visual Packet Builder Tool.
Figure 15

ARP Cache Poisoning Packet Generation Using CommView Visual Packet Builder Tool.

The experiments result indicates that the ARP cache poisoning attack has no effect on the tested readers. Consequently, the readers are protected from this type of attack. We believe that this is because of the simple implementation of the ARP protocol in these readers. In fact, the readers do not allow updating their ARP caches. They use static ARP cache entries, so that the entries cannot be updated by fake ARP request and replies. The ARP cache entries are created when the readers connect to the network. Once they get the MAC addresses of the biometric servers, they create static entries (IP/MAC addresses) in their ARP caches.

5 Secure Biometrics Readers Design Consideration

The experiments results demonstrate clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances significantly deteriorate just after launching the attacks. In fact, the security analysis conducted in this article proves that the tested biometric readers have been designed without any security consideration. Biometric readers usually are focusing on enhancing the recognition performance (identification accuracy rates, false acceptance ratios) of the biometric algorithms and technologies. Hence, they are easy targets for malicious network traffic and users.

Usually, biometric devices are designed to offer ease to use and practical user interfaces with effective costs, low enrollment and recognition time, and low false non-match and match rates. However, our work in this article shows that they are not designed to include basic security functions, mainly network packet filtering capabilities to filter the network traffic, and to integrate intrusion detection/prevention capabilities to detect and prevent network attacks and malicious network activities. Hence, biometric devices can be easily crashed or disconnected from the network by common DoS attacks. Consequently, their availability and efficiency may become questionable within any institution, and it will be difficult to rely on such devices to implement secure networks and biometric systems.

The following lists some basic security considerations that should be taken into consideration when designing secure biometric readers to limit the effect of DoS attacks:

  • The biometric reader’s user interface should allow the filtering of network packets, such as blocking all incoming ping requests.

  • The ARP cache of the biometric reader should be static, so that malicious ARP packets cannot update its contents with fake IP/MAC entries. This would allow protecting the reader from DoS attacks based on ARP cache poisoning attack.

  • Network traffic with high speed rate targeting the biometric reader should be denied from reaching the kernel of the reader. This would allow protecting the reader from many common DoS flood attacks, such as SYN flood attack.

Figure 16 shows typical secure biometric reader architecture. That is, commonly, to offer secure biometric readers, it is important to design readers that are able to offer at least the following basic security modules:

  1. Firewall module: allows implementing at least the basic common filtering rules to filter the network traffic exchanged by biometric readers.

  2. Intrusion detection module: allows protecting and preventing at least common network attacks, mainly DoS attacks. This intrusion detection module should be able to use basic common attack signatures and be able to download new attach signatures.

  3. Encryption module: allow encrypting the traffic between the biometric readers and servers. The encryption security capability will prevent malicious users from being able to spy and analyze the exchanged network traffic between the biometric readers and servers because the traffic is encrypted. Usually, malicious users use MiM attack techniques to collect the exchanged network traffic between the biometric readers and servers.

Figure 16 Typical Secure Biometric Reader Architecture.
Figure 16

Typical Secure Biometric Reader Architecture.

6 Conclusion

This article investigated the effect of common DoS attacks on the performance of several fingerprint and iris readers. Experiments are conducted using common DoS and ARP cache poisoning attacks.

The experiments results demonstrate clearly that the tested biometric readers lack robust security solutions, such as firewall packet filtering or intrusion detection/prevention capabilities, and consequently are easy targets for malicious network traffic and users. However, the tested biometric devices are protected from ARP cache poisoning attack because they use simple implementation of the ARP protocol. In fact, they use static ARP cache entries, instead of dynamic entries as is the case in ordinary computers.

To enhance the availability and efficiency of biometric readers and implement secure biometric-based systems, this article listed several security functions that should be incorporated into biometric readers, mainly network packet filtering, intrusion detection, and encryption capabilities.


Corresponding author: Zouheir Trabelsi, College of Information Technology, United Arab Emirates University, Al Maquam, PO Box: 17551, Al Ain, United Arab Emirates, e-mail:

Bibliography

[1] A. Al-Raisi and A. Al-Khouri, Iris recognition and the challenge of homeland and border control security in UAE, J. Telematics Inform.25 (2008), 117–132.10.1016/j.tele.2006.06.005Search in Google Scholar

[2] J. Chirillo and S. Blaul, Implementing biometric security, Wiley, USA, 2003.Search in Google Scholar

[3] CommView Visual Packet Builder. http://www.tamos.com.Search in Google Scholar

[4] J. Duagman, How iris recognition works, IEEE Trans. Circuits Syst. Video Technol.14 (2004), 21–30.10.1109/TCSVT.2003.818350Search in Google Scholar

[5] J. Duagman, Recognizing persons by their iris patterns, in: 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS, China, pp. 5–25, 2004.Search in Google Scholar

[6] Emerging technologies that will change the world, ten emerging technologies that will change the world, MIT Technol. Rev. (January/February 2001).Search in Google Scholar

[7] Fast Port Scanner tool. http://www.globalwebmonitor.com.Search in Google Scholar

[8] FrameIP Packet Generator. http://www.frameIP.com.Search in Google Scholar

[9] F7 Standalone Biometric Access Control Terminal. http://www.fslocks.com/f7stbiaccote.html.Search in Google Scholar

[10] IG-AD100® Iris Camera System. http://www.irisguard.com.Search in Google Scholar

[11] LG’s IrisAccess 4000. http://www.irisid.com.Search in Google Scholar

[12] MX600 Fingerprint Access Control. http://www.miaxis.net/1070012/1/products_details.htm.Search in Google Scholar

[13] Nitgen Fingerprint reader NAC 3000, specification sheet. http://www.nitgen.com.Search in Google Scholar

[14] Panasonic Iris reader BM-ET330, specification sheet. ftp://ftp.panasonic.com/pub/Panasonic/cctv/SpecSheets/BM-ET330.pdf.Search in Google Scholar

[15] SYN flood. http://www.frameIP.com.Search in Google Scholar

[16] Z. Trabelsi and K. Shuaib, A novel Man-in-the-Middle intrusion detection scheme for switched LANs, Int. J. Comput. Appl. 3 (2008), 234–243.Search in Google Scholar

[17] J. R. Vacca, Biometric technologies and verification systems, Butterworth-Heinemann, UK, 2007.Search in Google Scholar

[18] J. L. Wayman, A. K. Jain, D. Maltoni and D. Maio, Biometric systems: technology design and performance evaluation, Springer, NY, USA, 2005.10.1007/b138151Search in Google Scholar

Received: 2014-2-25
Published Online: 2014-9-12
Published in Print: 2015-6-1

©2015 by De Gruyter

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Downloaded on 20.4.2024 from https://www.degruyter.com/document/doi/10.1515/jisys-2014-0049/html
Scroll to top button