Efficient method for the Determination of Multiple Spoofing Attacks

Abstract

 The Paper proposes to utilize spatial data, a real possessions identified with every single hub, debilitating to misrepresent, now not dependent on cryptography, a root for recognizing caricaturing strike, evaluating the gathering of aggressors while several foes taking on the appearance of the comparable hub ID and confining a few adversaries. When the preparation information is accessible, the test impacts demonstrate the proposed strategies which can accomplish in excess of 90 percent Hit rate and Precision when deciding the decision of assaulters. The limitation impact the utilization of a delegate set of calculations supply vigorous confirmation of high precision of limiting more than one enemy.

Authors and Affiliations

R. Solai Prakash *1

Keywords

Related Articles

 NO MORE A MATHEMATICAL IMPOSSIBILITY – SQUARE ROOT OF Pi FOUND (117th Method)

 Pi is a geometrical constant. Its official value is 3.14159265358… March 1998 discovery says Pi value is 3.14644660941…. With the official number square root of Pi and squaring of circle are impossible. With 3.14...

 Efficient Power Saving during Handovers in Heterogeneous Network Scenario

 The Next Generation of wireless networks will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will integrate the current co-existing wireless networks to allow the use...

Integrated Lane Colorization Using Hough Transformation and Bilateral Filter

Lane coloration is a significant technique in a number of intelligent automobile applications, containing the lane trip recognition and warning board, intelligent journey control and autonomous driving. This paper prese...

 MULTI-KEY IMPLEMENTATION OF AES ALGORITHM IN VERILOG

 Increasing need of high security in communication led to the development of several cryptographic algorithms hence sending data securely over a transmission link is critically important in many applications. NIST...

 A Review: Text Detection in Natural Scenes with Stroke Width Transform

 Detecting text segments in an image of a natural scene, by using the Stroke Width Transform The approach of SWT is grouping pixels together in an intelligent way, instead of looking for separating features of pixe...

Download PDF file
  • EP ID EP122365
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

R. Solai Prakash *1 (30).  Efficient method for the Determination of Multiple Spoofing Attacks. International Journal of Engineering Sciences & Research Technology, 3(7), 35-39. https://europub.co.uk/articles/-A-122365