Multiple Spoofing Identification For Network Level Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.
Authors and Affiliations
G. Srikanth, M. Ashok Kumar
Empowering Document Clustering Through Multi View-Point Based Similarity Measure
Among data mining technique, clustering is one of the most important and traditional concept also an unsupervised learning paradigm. Similarity of a document pairs can be measured by matching of concepts. Finding or...
An Efficient Searching and File Replication Consistency in Peer-to-Peer Networks
Unstructured Network with file sharing properties with peer-to-peer (P2P) is very popular in the market. Though it is so popular it produce flooding query messages and result a heavy network traffic and which may not...
Efficient Defence System For Avoid Malware Propagation In Mobile Network
We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...
Hot Spot Cell Load Balancing
Cellular network has undergone explosive growth in terms of number of subscribers in last couple of decades. Today billions of people around the world use mobile telephones, penetrating around 60 % of global populati...
Significance of Complementary Spectral Features for Speaker Recognition
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech waves.. The most popular features for speaker recognition are Mel frequency ce...