Detecting and Localizing the Attackers in Multiple Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.

Authors and Affiliations

Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel

Keywords

Related Articles

Review of MANETS Using Distributed Public-key Cryptography

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumpt...

Query Based Expert Search Based on Relevance Class and Web Page Quality Ranking

Expert search is mostly used in the areas of academic groups, organizations. The general expert search problem which is observed is searching experts on the web where lot of web pages and experts names are considered. It...

Facilitating Document Annotation Using Content & Querying Value

Collections of huge, large textual data contains significant amount of structured information, which remains hidden in unstructured text. Relevant information is always difficult to find in these documents. In this paper...

Security Strategies for Online Social Networks

In this decade online social networks (OSNs) have marvelous enlargement per hundred of millions of users on the internet. The internet users are more good-looking about OSNs for information sharing and social interaction...

Comparative Analysis of Edge Based Single Image Superresolution

Super-resolution image reconstruction provides an effective way to increase image resolution from a single or multiple low resolution images. There exists various single image super-resolution based on different assumpti...

Download PDF file
  • EP ID EP162719
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Mr. S. A. Ramesh kumar, Mr. R. Thanigaivel (2014). Detecting and Localizing the Attackers in Multiple Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 221-226. https://europub.co.uk/articles/-A-162719