Multiple Spoofing Identification For Network Level Security

Abstract

It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.

Authors and Affiliations

G. Srikanth, M. Ashok Kumar

Keywords

Related Articles

Empowering Document Clustering Through Multi View-Point Based Similarity Measure

Among data mining technique, clustering is one of the most important and traditional concept also an unsupervised learning paradigm. Similarity of a document pairs can be measured by matching of concepts. Finding or...

An Efficient Searching and File Replication Consistency in Peer-to-Peer Networks

Unstructured Network with file sharing properties with peer-to-peer (P2P) is very popular in the market. Though it is so popular it produce flooding query messages and result a heavy network traffic and which may not...

Efficient Defence System For Avoid Malware Propagation In Mobile Network

We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...

Hot Spot Cell Load Balancing

Cellular network has undergone explosive growth in terms of number of subscribers in last couple of decades. Today billions of people around the world use mobile telephones, penetrating around 60 % of global populati...

Significance of Complementary Spectral Features for Speaker Recognition

Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech waves.. The most popular features for speaker recognition are Mel frequency ce...

Download PDF file
  • EP ID EP28237
  • DOI -
  • Views 248
  • Downloads 2

How To Cite

G. Srikanth, M. Ashok Kumar (2015). Multiple Spoofing Identification For Network Level Security. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28237