Multiple Spoofing Identification For Network Level Security

Abstract

It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian mixture model, RSS and K-means cluster analysis. None of the approach can determine number of attackers when used the same identity by adversaries. And the other techniques used to localize the attack detection Chen-et-al studied how to localize adversaries but can only handle only a single attack this study cannot detect if the attacker use different transmission power levels for sniffing the network. Where it is not possible to gain the knowledge needed to implement. We can overcome these approaches disadvantages by using our proposed system. We use ABP, Silence Mechanism, SVM for our proposed system, beside of the algorithms based on Radargridded algorithm, Bayesian network for the graphical identity, cluster analysis and the area based probability.

Authors and Affiliations

G. Srikanth, M. Ashok Kumar

Keywords

Related Articles

Modified Histogram Based Contrast Enhancement Using Unsharp masking Filter For Medical Images

Low contrast digital images analysis is major drawback in the medical image processing. An image with low contrast has a narrow histogram located typically toward the middle of the intensity scale. Low contrast digit...

Survey, Classification and Future Direction for Packet Scheduling in 4G Networks to Provide Quality of Service

Packet scheduling is crucial in providing Quality of Service (QoS) at a network node. There is plenty of research related to QoS provisioning in fourth generation (4G) networks because wireless networks have shifted f...

New Approaches of Ranking Queries in Uncertain Databases

New applications such as sensor data monitoring and mobile device tracking, rise up the issue of uncertain data management. Compared to “certain” data, the data in the uncertain database are not exact points, which, i...

A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference

Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...

Addressing MDX Injection issue in Big Data using ASCII Based String Matching

MDX injection is one of the most threats for application written for Web. Big data is the ability of providing exponential growth and availability of data. Since the data in here are unstructured and therefore normal...

Download PDF file
  • EP ID EP28237
  • DOI -
  • Views 253
  • Downloads 2

How To Cite

G. Srikanth, M. Ashok Kumar (2015). Multiple Spoofing Identification For Network Level Security. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28237