Detecting and Localizing the Attackers in Multiple Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.

Authors and Affiliations

Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel

Keywords

Related Articles

Study of TCP Packet Labeling to Alleviate Time-Out

Many applications (e.g., cluster based storage and Map Reduce) in modern data centers require a high fan-in, many- to-one type of data communication (known as TCP in cast), which could cause severe in cast congestion in...

Private Grid Environment for Personal Users

The overall aim of this paper is to introduce the Private grid environment (PvGrid) as a ubiquitous grid environment that is not only owned and utilized by personal users but also deployed over their own devices. In this...

Microblogging Service to Report about Earthquake

Data Mining is the extraction of hidden predictive information from large Database set. The huge amount of data is a key resource to be processed and analyzed for knowledge extraction. Volcanic action Reporting system is...

Minimizing Spurious Patterns Using Association Rule Mining

Most of the clustering algorithms extract patterns which are of least interest. Such pattern consists of data items which usually belong to widely different support levels. Such data items belonging to different support...

Efficient Preprocessing and Patterns Identification Approach for Text Mining

Due to the rapid expansion of digital data , knowledge discovery and data mining have attracted significant amount of a ttention for turning such data into helpful information and knowledge. Text categorization is contin...

Download PDF file
  • EP ID EP162719
  • DOI -
  • Views 81
  • Downloads 0

How To Cite

Mr. S. A. Ramesh kumar, Mr. R. Thanigaivel (2014). Detecting and Localizing the Attackers in Multiple Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 221-226. https://europub.co.uk/articles/-A-162719