Detecting and Localizing the Attackers in Multiple Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.
Authors and Affiliations
Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel
Statistical Anomaly Detection Technique for Real Time Datasets
Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...
Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending inf...
Implementation of E-mail Access for Vision Impaired Person Using Speech Synthesizer
Developments in technology over the last twenty years have enhanced the possibilities for learning and working for people with vision impairments. Computers with speech or Braille output peripherals, or portable speech-o...
A Puzzle Based Authentication Scheme for Cloud Computing
This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...
Information Extraction using Incremental Approach
Data mining is playing vital role in text extraction as now a day’s large amount of data available in scientific research, biomedical literature and web data. Data retrieval using existing approaches use sequential appro...