Detecting and Localizing the Attackers in Multiple Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.

Authors and Affiliations

Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel

Keywords

Related Articles

Statistical Anomaly Detection Technique for Real Time Datasets

Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...

Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS

Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending inf...

Implementation of E-mail Access for Vision Impaired Person Using Speech Synthesizer

Developments in technology over the last twenty years have enhanced the possibilities for learning and working for people with vision impairments. Computers with speech or Braille output peripherals, or portable speech-o...

A Puzzle Based Authentication Scheme for Cloud Computing

This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...

Information Extraction using Incremental Approach

Data mining is playing vital role in text extraction as now a day’s large amount of data available in scientific research, biomedical literature and web data. Data retrieval using existing approaches use sequential appro...

Download PDF file
  • EP ID EP162719
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

Mr. S. A. Ramesh kumar, Mr. R. Thanigaivel (2014). Detecting and Localizing the Attackers in Multiple Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 221-226. https://europub.co.uk/articles/-A-162719