Multiple Spoofing Identification For Network Level Security

Abstract

It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.

Authors and Affiliations

G. Srikanth, M. Ashok Kumar

Keywords

Related Articles

Modeling A New Architecture Of Area Delay Efficient 2-D Fir Filter Using VHDL

This paper presented memory footprint and combinational complexity for two - dimensional finite impulse response (FIR) filter to get the systematic design strategy to obtain areadelay-power-efficient architectures. Ba...

Performance of Different Bow Tie Antennas In Fresh Water

In this paper, the performance of a different microstrip fed bow tie antennas in water is studied. The antennas are designed and simulated using the simulator tool HFSS (High Frequency Structure Simulator). The antenna...

An application of customizable content-based filtering for unwanted messages on OSN walls

The attempt of the present work is consequently to propose and experimentally estimate an automated system called Filtered Wall (FW) which is capable to filter unwanted messages from OSN user walls. We develop Machin...

Performance Analysis Of Adaptive Median Filter In Reducing Impulse Noise

A methodology based on median filter for the removal of salt and pepper noise by its detection followed by filtering in binary images has been proposed in this paper.The,filter such as adaptive median filter is derive...

Implementation of VLSI Based Router for Custom Network On Chip Applications

A fast full-chip synthesis method to construct network-on-chips (Custom Noc) for network on chip based systems.It can be used for irregular network topology for specific designs with already known communication deman...

Download PDF file
  • EP ID EP28237
  • DOI -
  • Views 269
  • Downloads 2

How To Cite

G. Srikanth, M. Ashok Kumar (2015). Multiple Spoofing Identification For Network Level Security. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28237