Survey of Detection and Localization of Multiple Spoofing Attacks in Wireless Networks?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 7)
Publication Date: 2014-07-30
Authors : K.Suresh Babu; Swetha Gurram;
Page : 13-17
Keywords : Wireless network security; spoofing attack; attack detection; localization; wireless spoofing;
Wireless systems are defenseless to spoofing attacks, which takes into consideration numerous different types of attacks on the systems. Despite the fact that the personality of a hub might be confirmed through cryptographic verification, confirmation is not dependably conceivable in light of the fact that it requires key administration and extra infrastructural overhead. A method for both detecting spoofing attacks and spotting the positions of foes performing the attacks is introduced. An attack detector for wireless spoofing that uses K-implies cluster analysis is used. Next, how we integrated our attack detector into a real time indoor confinement framework is portrayed, which is additionally equipped for limiting the positions of the attackers. It is shown that the positions of the attackers might be confined utilizing either zone based or focus based confinement calculations with the same relative slips as in the ordinary case. We have assessed our routines through experimentation utilizing both a 802.11 (Wifi) organize and additionally an 802.15.4 (Zigbee) system. Our effects show that it is conceivable to identify wireless spoofing with both a high recognition rate and a low false positive rate, along these lines furnishing solid proof of the viability of the K-methods spoofing detector and also the attack localizer.
Other Latest Articles
Last modified: 2014-08-11 20:02:26