Detecting and Localizing the Attackers in Multiple Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
Spoofing attack which easily attack the network and reduce the performance of the network. In this Paper, Spoofing attacks are detected, Finding the number of attackers that masquerade the node identity, Localizing all the attackers node and calculate the speed of a node, by using RSS (received signal strength) for spoofing detection. The number of attacker is determined by cluster- based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate our method in two real office, an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network. Our method gives over 90 percent of Hit Rate.
Authors and Affiliations
Mr. S. A. Ramesh kumar , Mr. R. Thanigaivel
Risk Management a t Universities Illegal Residents in Hostels & Fire Cases
Every organization/institution is exposed to some kinds of risks that can affect them in many ways. Risks like fire, theft, damage of assets, illegal intruders etc. can affect them strategically, financially and operatio...
Literature Survey on Preference Database
Preference data base (Pref DB) used to provide appropriate recommendations to the users on their relevant search and preferences. The design is made such that user interested data is obtained from the database. PrefDB us...
LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory
As the performance gap between memory and processors has increased, then it leads to the poor performance. Efficient virtual memory can overcome this problem. And the efficiency of virtual memory depends on the replaceme...
A Smart Intelligent Way of Video Authentication Using Classification and Decomposition of Watermarking Methods
Video Watermarking serves as a new technology mainly used to provide security to the illegal distribution of digital video over the web. The purpose of any video watermarking scheme is to embed extra information into vid...
Information Extraction using Incremental Approach
Data mining is playing vital role in text extraction as now a day’s large amount of data available in scientific research, biomedical literature and web data. Data retrieval using existing approaches use sequential appro...