Detecting and Localizing the Attackers in Multiple Networks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5

Abstract

Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.

Authors and Affiliations

Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel

Keywords

Related Articles

Anomaly Extraction in Networks

The application detects anomaly in network using techniques like histogram, cloning voting, filtering. To extract anomalous flows, one could build a model describing normal flow characteristics and use the model to ident...

Ensuring Accountability for Data Sharing in Cloud

Cloud computing is emerging rapidly as part of latest developments in communication trends and technology. It brought revolution in today’s world among key stakeholders like service providers and consumers. As a result,...

Risk Management a t Universities Illegal Residents in Hostels & Fire Cases

Every organization/institution is exposed to some kinds of risks that can affect them in many ways. Risks like fire, theft, damage of assets, illegal intruders etc. can affect them strategically, financially and operatio...

Enhancing Adaptive Content Based Face Image Retrieval in Database

To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image...

Survey on Clustering Algorithms for Sentence Level Text

Clustering is an extensively studied data mining problem in the text domains. The difficulty finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organiza...

Download PDF file
  • EP ID EP162719
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

Mr. S. A. Ramesh kumar, Mr. R. Thanigaivel (2014). Detecting and Localizing the Attackers in Multiple Networks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(5), 221-226. https://europub.co.uk/articles/-A-162719