Detecting and Localizing the Attackers in Multiple Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.

Authors and Affiliations

Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel

Keywords

Related Articles

A Survey on Spatial Co-location Patterns Discovery from Spatial Datasets

Spatial data mining or Knowledge discovery in spatial database is the extraction of implicit knowledge, spatial relations and spatial patterns that are not explicitly stored in databases. Co-location patterns discovery i...

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction

Machine Learning (ML) approaches have a great impact in fault prediction. Demand for producing quality assured software in an organization has been rapidly increased during the last few years. This leads to increase in d...

Decision Support System to Majoring High School Student Using Simple Additive Weighting Method

Decision choice problems occur in every age levels, including teen-age when students will go to higher school level education. Senior High School is the first level of education that student chooses and follows the major...

A Study of Local Binary Pattern Method for Facial Expression Detection

Face detection is a basic task for expression recognition. The reliability of face detection & face recognition approach has a major role on the performance and usability of the entire system. There are several ways...

Review of MANETS Using Distributed Public-key Cryptography

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...

Download PDF file
  • EP ID EP162719
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Mr. S. A. Ramesh kumar, Mr. R. Thanigaivel (2014). Detecting and Localizing the Attackers in Multiple Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 221-226. https://europub.co.uk/articles/-A-162719