Multiple Spoofing Identification For Network Level Security
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.
Authors and Affiliations
G. Srikanth, M. Ashok Kumar
A Mustang Security User Authentication Scheme Based On Graphical Password
In all computer security contexts, User authentication is an essential thing. The most popular and simple type of user authentication method is to use the alphanumeric passwords. The reasons behind why we are using a...
A Critical Study on Semantic Web Systems and Semantic Web Services
The World Wide Web is the greatest repository of information having a decentralized design in which web pages are hosted by numerous computers, where each document can point to other documents, either on the same or...
Effective Load Balancing Technique In Pcloud
In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet. But it has more critical issue like security, load manage...
An Optimal and Secure Ranking Search Over out Sourced Cloud Databases
Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...
Competent Dependable Convergent Key Management for Reliable Deduplication
De-Duplication enhances Storage and data transmission effectiveness is contradictory with conventional encryption. In conventional model encryption requires diverse clients to encode their own information with their...