Multiple Spoofing Identification For Network Level Security

Abstract

It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.

Authors and Affiliations

G. Srikanth, M. Ashok Kumar

Keywords

Related Articles

A Mustang Security User Authentication Scheme Based On Graphical Password

In all computer security contexts, User authentication is an essential thing. The most popular and simple type of user authentication method is to use the alphanumeric passwords. The reasons behind why we are using a...

A Critical Study on Semantic Web Systems and Semantic Web Services

The World Wide Web is the greatest repository of information having a decentralized design in which web pages are hosted by numerous computers, where each document can point to other documents, either on the same or...

Effective Load Balancing Technique In Pcloud

In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet. But it has more critical issue like security, load manage...

An Optimal and Secure Ranking Search Over out Sourced Cloud Databases

Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...

Competent Dependable Convergent Key Management for Reliable Deduplication

De-Duplication enhances Storage and data transmission effectiveness is contradictory with conventional encryption. In conventional model encryption requires diverse clients to encode their own information with their...

Download PDF file
  • EP ID EP28237
  • DOI -
  • Views 277
  • Downloads 2

How To Cite

G. Srikanth, M. Ashok Kumar (2015). Multiple Spoofing Identification For Network Level Security. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28237