SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 132
Detection of Spoofing attackers in wireless network
Raju M. Shingade Abhishek V. Mane (M.S)
IV Semester, M-Tech, Dept of Computer Assistant Professor, Dept of Computer
VJTI College Mumbai VJTI College Mumbai
rajshingade@gmail.com abhishekmane01@gmail.com
Abstract— Spoofing attacks effectively damage the networks performance and easy to launch by many tools available
in market. The previous security approach to address spoofing attacks is to apply cryptographic authentication.
However authentication method requires more infrastructures overhead. In this paper I propose the system of
detecting spoofing attackers in wireless network by using spatial information associated with each node hard to falsify
and not based on cryptography. This methodology can detect the attacks by spatial correlation received signal strength
(RSS), inherited from multiple wireless node. To determine multiple spoofing attackers cluster based mechanisms are
developed. I explore using the Support Vector Machines (SVM) method to further improve the accuracy of
determining the number of attackers. In addition, I developed an integrated detection and localization system that can
localize the positions of multiple attackers. The proposed methodology will obtain a reliable outcome that could be
helpful in identifying and eliminating certain attacks.
Keywords— Wireless network security, cryptography, spoofing attack, attack detection
I. INTRODUCTION
Due to openness wireless network becomes target of most of the attacks. Due to the open-nature of these platforms, it
will be particularly susceptible to spoofing attacks, where adversaries alter their network identifiers to those of legitimate
entities. Spoofing attacks can be easily launched. As because of its open and shared nature of the wireless medium, where
adversaries can perform passive monitoring of useful information of identity of user and then masquerade as another
device using the collected identity. Spoofing attacks can further facilitate a variety of traffic injection attacks [1], [2],
such as attacks on access control lists, rogue access point attacks, and eventually Denial-of-Service (DoS) attacks.
Therefore it is important to detect spoofing attacks and prevent them and to prevent the attacks we have to first find out
the attackers. Most previous approaches to find spoofing attacks required cryptographic methods. However the
application of cryptographic methods requires reliable key distribution, management and maintenance mechanisms. It is
not always desirable to apply these cryptographic methods because of the computational, distributional, infrastructural
and management overhead. Existing 802.11 security techniques including Wired Equivalent Privacy (WEP), WiFi
Protected Access (WPA), or 802.11i (WPA2), such methodology can only protect data frames an attacker can still spoof
management or control frames to cause significant impact on networks.
In this paper I propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries
performing the attacks.
II. SPOOFING ATTACK
Spoofing means, pretending to be something you are not. In Internet terms it means pretending to be a different Internet
address from the one you really have in order to gain something. Spoofing attacks have different types like Email
spoofing, DNS spoofing, ARP spoofing, WEB spoofing and IP spoofing we mainly focus on IP Spoofing. IP spoofing
attack involves forging one's source address. It is the act of using one machine to impersonate another. Spoofing is an
active security attack in which one machine on the network masquerades as a different machine. As an active attack, it
disrupts the normal flow of data and may involve injecting data into the communications link between other machines.
III. EXISTING METHOD
The identity of a node can be verified through conventional security approaches are not always desirable. Adversaries
can easily purchase low-cost devices and use these commonly available platforms to launch a variety of attacks. Among
various types of attacks, identity-based spoofing attacks are especially easy to launch and can cause significant damage to
network performance. It is easy for an attacker to gather useful MAC address information during passive monitoring and
then modify its MAC address. It can further facilitate a variety of traffic injection attacks, such as attacks on access
control lists, rogue access point (AP) attacks, and eventually denial of service (DOS) attacks. The traditional approach to
address spoofing attacks is to apply cryptographic authentication. However, authentication requires additional
infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Due
to the limited power and resources available to the wireless devices and sensor nodes, it is not always possible to deploy
authentication. In addition, key management often incurs significant human management costs on the network.
IV.PROPOSED METHOD
1) Detecting the presence of spoofing attacks
2) Determining the number of attackers when multiple adversaries masquerading as the same node identity
3) Localizing multiple adversaries and eliminate them
International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 133
Fig. 1 Spoofing attack
V. MODULES
1) Network configuration
2) Generalized attack detection model
3) Integrated detection and localization framework
4) Performance evaluation
a) Module Description
1) Network configuration
The nodes are created and located in the simulation environment. The nodes are moved from one location to another
location. The setdest command is used to give the movement to a node. The Random way point mobility model is used in
our simulation. The nodes are using Omni-antenna to send and receive the data. The signals are propagated from one
location to another location by using Two Ray Ground propagation model. The Priority Queue is maintained between
any of the two nodes as the interface Queue.
2) Generalized Attack Detection Model
The Generalized Attack Detection Model consists of two phases: attack detection, which detects the presence of an attack,
and number determination, which determines the number of adversaries. The challenge in spoofing detection is to devise
International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 134
strategies that use the uniqueness of spatial information, but not using location directly as the attackers’ positions are
unknown. RSS property is closely correlated with location in physical space and is readily available in the existing
wireless networks. Although affected by random noise, environmental bias, and multipath effects, the RSS measured at a
set of landmarks is closely related to the transmitter’s physical location and is governed by the distance to the landmarks.
The RSS readings at the same physical location are similar, whereas the RSS readings at different locations in physical
space are distinctive. Thus, the RSS readings present strong spatial correlation characteristics.
3) Integrated Detection and Localization Framework
In this module, an integrated system that can both detect spoofing attacks, determine the number of attackers, and
localize multiple adversaries.
The traditional localization approaches are based on averaged RSS from each node identity inputs to estimate the
position of a node. However, in wireless spoofing attacks, the RSS stream of a node identity may be mixed with RSS
readings of both the original node as well as spoofing nodes from different physical locations. The traditional method of
averaging RSS readings cannot differentiate RSS readings from different locations and thus is not feasible for localizing
adversaries. Different from traditional localization approaches, our integrated detection and localization system utilize
the RSS medoids returned from SILENCE as inputs to localization algorithms to estimate the positions of adversaries.
The return positions from our system include the location estimate of the original node and the attackers in the physical
space. Handling adversaries using different transmission power levels. An adversary may vary the transmission power
levels when performing spoofing attacks so that the localization system cannot estimate its location accurately.
4) Performance Evaluation
The performance of the proposed scheme is evaluated by plotting the graph. The parameter used to evaluate the
performance is as follows:
• False positive Rate
• Spoofing Detection rate
• Throughput
These parameter values are recorded in the trace file during the simulation by using record procedure. The recorded
details are stored in the trace file. The trace file is executed by using the Xgraph to get graph as the output.
VI.ALGORITHMS
In order to evaluate the generality of IDOL for localizing adversaries, we have chosen a set of representative localization
algorithms ranging from nearest neighbor matching in signal space (RADAR ), to probability-based (Area-Based
Probability ), and to multilateration (Bayesian Networks) .
RADAR-Gridded: The RADAR-Gridded algorithm is a scene-matching localization algorithm extended from. RADAR-
Gridded uses an interpolated signal map, which is built from a set of averaged RSS readings with known (x, y) locations.
Given an observed RSS reading with an unknown location, RADAR returns the x, y of the nearest neighbor in the signal
map to the one to localize, where "nearest" is defined as the Euclidean distance of RSS points in an N-dimensional signal
space, where N is the number of landmarks.
Area Based Probability (ABP): ABP also utilizes an interpolated signal map. Further, the experimental area is divided
into a regular grid of equal sized tiles. ABP assumes the distribution of RSS for each landmark follows a Gaussian
distribution with mean as the expected value of RSS reading vector s. ABP then computes the probability of the wireless
device being at each tile Li, with i = 1...L, on the floor using
Bayes’ rule:
Given that the wireless node must be at exactly one tile satisfying ∑L
i=1P(Li|s) = 1, ABP normalizes the
probability and returns the most likely tiles/grids up to its confidence α.
Bayesian Networks (BN): BN localization is a multilateration algorithm that encodes the signal-to-distance
propagation model into the Bayesian Graphical Model for localization. Figure 2 shows the basic Bayesian Network used
for our study. The vertices X and Y represent location; the vertex si is the RSS reading from the ith landmark; and the
vertex Di represents the Euclidean distance between the location specified by X and Y and the ith landmark. The value of
si follows a signal propagation model si = b0i+b1i logDi, where b0i, b1i are the parameters specific to the ith landmark The
distance Di =√(X − xi)2
+ (Y − yi)2
in turn depends on the location (X, Y ) of the measured signal and the coordinates (xi,
International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 135
yi) of the ith landmark. The network models noise and outliers by modeling the si as a Gaussian distribution around the
above propagation model, with variance τi: si~N(b0i + b1i logDi, τi). Through Markov Chain Monte Carlo (MCMC)
simulation, BN returns the sampling distribution of the possible location of X and Y as the localization result.
Fig 2. Bayasian graphical model in our study
VII. CONCLUSIONS
In this work, we proposed to use received signal strength based spatial correlation, a physical property associated with
each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in
wireless networks. We provided theoretical analysis of using the spatial correlation of RSS inherited from wireless nodes
for attack detection. We derived the test statistic based on the cluster analysis of RSS readings. Our approach can both
detect the presence of attacks as well as determine the number of adversaries. Determining the number of adversaries is a
particularly challenging problem. We developed SILENCE, a mechanism that employs the minimum distance testing in
addition to cluster analysis to achieve better accuracy of determining the number of attackers than other methods under
study, such as Silhouette Plot and System Evolution that use cluster analysis alone. Additionally, when the training data
are available, we explored using Support Vector Machines-based mechanism to further improve the accuracy of
determining the number of attackers present in the system. Further, based on the number of attackers determined by our
mechanisms, our integrated detection and localization system can localize any number of adversaries even when
attackers using different transmission power levels. The performance of localizing adversaries achieves similar results as
those under normal conditions, thereby, providing strong evidence of the effectiveness of our approach in detecting
wireless spoofing attacks, determining the number of attackers and localizing adversaries
REFERENCES
[1] J. Bellardo and S. Savage, 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, Proc.
USENIX Security Symp., pp. 15-28, 2003.
[2] [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11
Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004.
[3] [3] D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc.
ACM Workshop Wireless Security (WiSe), Sept. 2006.
[4] [4] Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc
Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.
[5] [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc
Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005.
[6] [6] A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host
Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005.
[7] [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using
Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008
[8] J. Yang, Y. Chen, and W. Trappe, “Detecting spoofing attacks in mobile wireless environments,” in Proc. IEEE
SECON, 2009.
[9] J. Wright, “Detecting wireless LAN MAC address spoofing,” 2003, technical document. [Online]. Available:
http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf
[10] NS2 Tutorial http://www.isi.edu/nsnam/ns

Contenu connexe

Tendances

Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection Systemtheijes
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...IRJET Journal
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testingeSAT Publishing House
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET Journal
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosecErfan Mallick
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a reviewINFOGAIN PUBLICATION
 
Clustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security ApplicationsClustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security ApplicationsIJSTA
 
AktaionvWhitePaperBlackHat2016
AktaionvWhitePaperBlackHat2016AktaionvWhitePaperBlackHat2016
AktaionvWhitePaperBlackHat2016Rod Soto
 

Tendances (15)

Hacking
HackingHacking
Hacking
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
Bu24478485
Bu24478485Bu24478485
Bu24478485
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
 
G0262042047
G0262042047G0262042047
G0262042047
 
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksIntegrated Security and Attack Detection Scheme for Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testing
 
Es34887891
Es34887891Es34887891
Es34887891
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
 
1 ijaems sept-2015-3-different attacks in the network a review
1 ijaems sept-2015-3-different attacks in the network  a review1 ijaems sept-2015-3-different attacks in the network  a review
1 ijaems sept-2015-3-different attacks in the network a review
 
Clustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security ApplicationsClustering Categorical Data for Internet Security Applications
Clustering Categorical Data for Internet Security Applications
 
AktaionvWhitePaperBlackHat2016
AktaionvWhitePaperBlackHat2016AktaionvWhitePaperBlackHat2016
AktaionvWhitePaperBlackHat2016
 

En vedette

Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...AM Publications
 
Mo bld 60403 building services 1
Mo bld 60403 building services 1 Mo bld 60403 building services 1
Mo bld 60403 building services 1 chloeesim
 
Exploring New Technologies for Non-Destructive Adjustment of Running Times of...
Exploring New Technologies for Non-Destructive Adjustment of Running Times of...Exploring New Technologies for Non-Destructive Adjustment of Running Times of...
Exploring New Technologies for Non-Destructive Adjustment of Running Times of...Scott Matics
 
20130214 studiedag CEMO
20130214 studiedag CEMO20130214 studiedag CEMO
20130214 studiedag CEMOBert Desmet
 
Matt Kapral Resume
Matt Kapral ResumeMatt Kapral Resume
Matt Kapral ResumeMatt Kapral
 
Non profit director performance appraisal
Non profit director performance appraisalNon profit director performance appraisal
Non profit director performance appraisalEmmanuelPetit678
 
Rubyliz gonzalez
Rubyliz gonzalezRubyliz gonzalez
Rubyliz gonzalezregino216
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
 
DEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACK
DEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACKDEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACK
DEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACKAM Publications
 
What is visual storytelling and how do we do it?
What is visual storytelling and how do we do it?What is visual storytelling and how do we do it?
What is visual storytelling and how do we do it?Michael Tringe
 
Recognizing activities...
Recognizing activities...Recognizing activities...
Recognizing activities...Andreea_Maria
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARESA COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARESAM Publications
 
Rita campusano quandary
Rita campusano   quandaryRita campusano   quandary
Rita campusano quandaryJhanndy
 
A Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different AlgorithmsA Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different AlgorithmsAM Publications
 
Exam english 1 first
Exam english 1 firstExam english 1 first
Exam english 1 firstmgomeznavar
 
PM [B06] Complex Polar Coordinates
PM [B06] Complex Polar CoordinatesPM [B06] Complex Polar Coordinates
PM [B06] Complex Polar CoordinatesStephen Kwong
 

En vedette (19)

Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better...
 
Mo bld 60403 building services 1
Mo bld 60403 building services 1 Mo bld 60403 building services 1
Mo bld 60403 building services 1
 
Conflict management
Conflict managementConflict management
Conflict management
 
Exploring New Technologies for Non-Destructive Adjustment of Running Times of...
Exploring New Technologies for Non-Destructive Adjustment of Running Times of...Exploring New Technologies for Non-Destructive Adjustment of Running Times of...
Exploring New Technologies for Non-Destructive Adjustment of Running Times of...
 
20130214 studiedag CEMO
20130214 studiedag CEMO20130214 studiedag CEMO
20130214 studiedag CEMO
 
Matt Kapral Resume
Matt Kapral ResumeMatt Kapral Resume
Matt Kapral Resume
 
Non profit director performance appraisal
Non profit director performance appraisalNon profit director performance appraisal
Non profit director performance appraisal
 
Rubyliz gonzalez
Rubyliz gonzalezRubyliz gonzalez
Rubyliz gonzalez
 
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...
 
DEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACK
DEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACKDEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACK
DEVELOPMENT of PROTOTYPE LAPAROSCOPIC GRASPER with HAPTIC FEEDBACK
 
What is visual storytelling and how do we do it?
What is visual storytelling and how do we do it?What is visual storytelling and how do we do it?
What is visual storytelling and how do we do it?
 
Recognizing activities...
Recognizing activities...Recognizing activities...
Recognizing activities...
 
Sunice
SuniceSunice
Sunice
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARESA COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
A COMPARATIVE STUDY OF OMRF & SMRF STRUCTURAL SYSTEM USING DIFFERENT SOFTWARES
 
Rita campusano quandary
Rita campusano   quandaryRita campusano   quandary
Rita campusano quandary
 
A Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different AlgorithmsA Review on Analysis on Codes using Different Algorithms
A Review on Analysis on Codes using Different Algorithms
 
Exam english 1 first
Exam english 1 firstExam english 1 first
Exam english 1 first
 
PM [B06] Complex Polar Coordinates
PM [B06] Complex Polar CoordinatesPM [B06] Complex Polar Coordinates
PM [B06] Complex Polar Coordinates
 

Similaire à Detection of Spoofing attackers in wireless network

A030101001006
A030101001006A030101001006
A030101001006theijes
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityeSAT Journals
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for networkeSAT Publishing House
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesIJNSA Journal
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area networkIAEME Publication
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsAM Publications,India
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
 

Similaire à Detection of Spoofing attackers in wireless network (20)

A030101001006
A030101001006A030101001006
A030101001006
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
An improved ip traceback mechanism for network security
An improved ip traceback mechanism for network securityAn improved ip traceback mechanism for network security
An improved ip traceback mechanism for network security
 
Ijcet 06 07_001
Ijcet 06 07_001Ijcet 06 07_001
Ijcet 06 07_001
 
N44096972
N44096972N44096972
N44096972
 
An improved ip traceback mechanism for network
An improved ip traceback mechanism for networkAn improved ip traceback mechanism for network
An improved ip traceback mechanism for network
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web ServicesPattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
F0371046050
F0371046050F0371046050
F0371046050
 
T04506110115
T04506110115T04506110115
T04506110115
 
A survey on evil twin detection methods for wireless local area network
A survey on evil twin detection methods for wireless  local area networkA survey on evil twin detection methods for wireless  local area network
A survey on evil twin detection methods for wireless local area network
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 

Plus de AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

Plus de AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Dernier

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 

Dernier (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 

Detection of Spoofing attackers in wireless network

  • 1. International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 132 Detection of Spoofing attackers in wireless network Raju M. Shingade Abhishek V. Mane (M.S) IV Semester, M-Tech, Dept of Computer Assistant Professor, Dept of Computer VJTI College Mumbai VJTI College Mumbai rajshingade@gmail.com abhishekmane01@gmail.com Abstract— Spoofing attacks effectively damage the networks performance and easy to launch by many tools available in market. The previous security approach to address spoofing attacks is to apply cryptographic authentication. However authentication method requires more infrastructures overhead. In this paper I propose the system of detecting spoofing attackers in wireless network by using spatial information associated with each node hard to falsify and not based on cryptography. This methodology can detect the attacks by spatial correlation received signal strength (RSS), inherited from multiple wireless node. To determine multiple spoofing attackers cluster based mechanisms are developed. I explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, I developed an integrated detection and localization system that can localize the positions of multiple attackers. The proposed methodology will obtain a reliable outcome that could be helpful in identifying and eliminating certain attacks. Keywords— Wireless network security, cryptography, spoofing attack, attack detection I. INTRODUCTION Due to openness wireless network becomes target of most of the attacks. Due to the open-nature of these platforms, it will be particularly susceptible to spoofing attacks, where adversaries alter their network identifiers to those of legitimate entities. Spoofing attacks can be easily launched. As because of its open and shared nature of the wireless medium, where adversaries can perform passive monitoring of useful information of identity of user and then masquerade as another device using the collected identity. Spoofing attacks can further facilitate a variety of traffic injection attacks [1], [2], such as attacks on access control lists, rogue access point attacks, and eventually Denial-of-Service (DoS) attacks. Therefore it is important to detect spoofing attacks and prevent them and to prevent the attacks we have to first find out the attackers. Most previous approaches to find spoofing attacks required cryptographic methods. However the application of cryptographic methods requires reliable key distribution, management and maintenance mechanisms. It is not always desirable to apply these cryptographic methods because of the computational, distributional, infrastructural and management overhead. Existing 802.11 security techniques including Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA), or 802.11i (WPA2), such methodology can only protect data frames an attacker can still spoof management or control frames to cause significant impact on networks. In this paper I propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. II. SPOOFING ATTACK Spoofing means, pretending to be something you are not. In Internet terms it means pretending to be a different Internet address from the one you really have in order to gain something. Spoofing attacks have different types like Email spoofing, DNS spoofing, ARP spoofing, WEB spoofing and IP spoofing we mainly focus on IP Spoofing. IP spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another. Spoofing is an active security attack in which one machine on the network masquerades as a different machine. As an active attack, it disrupts the normal flow of data and may involve injecting data into the communications link between other machines. III. EXISTING METHOD The identity of a node can be verified through conventional security approaches are not always desirable. Adversaries can easily purchase low-cost devices and use these commonly available platforms to launch a variety of attacks. Among various types of attacks, identity-based spoofing attacks are especially easy to launch and can cause significant damage to network performance. It is easy for an attacker to gather useful MAC address information during passive monitoring and then modify its MAC address. It can further facilitate a variety of traffic injection attacks, such as attacks on access control lists, rogue access point (AP) attacks, and eventually denial of service (DOS) attacks. The traditional approach to address spoofing attacks is to apply cryptographic authentication. However, authentication requires additional infrastructural overhead and computational power associated with distributing, and maintaining cryptographic keys. Due to the limited power and resources available to the wireless devices and sensor nodes, it is not always possible to deploy authentication. In addition, key management often incurs significant human management costs on the network. IV.PROPOSED METHOD 1) Detecting the presence of spoofing attacks 2) Determining the number of attackers when multiple adversaries masquerading as the same node identity 3) Localizing multiple adversaries and eliminate them
  • 2. International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 133 Fig. 1 Spoofing attack V. MODULES 1) Network configuration 2) Generalized attack detection model 3) Integrated detection and localization framework 4) Performance evaluation a) Module Description 1) Network configuration The nodes are created and located in the simulation environment. The nodes are moved from one location to another location. The setdest command is used to give the movement to a node. The Random way point mobility model is used in our simulation. The nodes are using Omni-antenna to send and receive the data. The signals are propagated from one location to another location by using Two Ray Ground propagation model. The Priority Queue is maintained between any of the two nodes as the interface Queue. 2) Generalized Attack Detection Model The Generalized Attack Detection Model consists of two phases: attack detection, which detects the presence of an attack, and number determination, which determines the number of adversaries. The challenge in spoofing detection is to devise
  • 3. International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 134 strategies that use the uniqueness of spatial information, but not using location directly as the attackers’ positions are unknown. RSS property is closely correlated with location in physical space and is readily available in the existing wireless networks. Although affected by random noise, environmental bias, and multipath effects, the RSS measured at a set of landmarks is closely related to the transmitter’s physical location and is governed by the distance to the landmarks. The RSS readings at the same physical location are similar, whereas the RSS readings at different locations in physical space are distinctive. Thus, the RSS readings present strong spatial correlation characteristics. 3) Integrated Detection and Localization Framework In this module, an integrated system that can both detect spoofing attacks, determine the number of attackers, and localize multiple adversaries. The traditional localization approaches are based on averaged RSS from each node identity inputs to estimate the position of a node. However, in wireless spoofing attacks, the RSS stream of a node identity may be mixed with RSS readings of both the original node as well as spoofing nodes from different physical locations. The traditional method of averaging RSS readings cannot differentiate RSS readings from different locations and thus is not feasible for localizing adversaries. Different from traditional localization approaches, our integrated detection and localization system utilize the RSS medoids returned from SILENCE as inputs to localization algorithms to estimate the positions of adversaries. The return positions from our system include the location estimate of the original node and the attackers in the physical space. Handling adversaries using different transmission power levels. An adversary may vary the transmission power levels when performing spoofing attacks so that the localization system cannot estimate its location accurately. 4) Performance Evaluation The performance of the proposed scheme is evaluated by plotting the graph. The parameter used to evaluate the performance is as follows: • False positive Rate • Spoofing Detection rate • Throughput These parameter values are recorded in the trace file during the simulation by using record procedure. The recorded details are stored in the trace file. The trace file is executed by using the Xgraph to get graph as the output. VI.ALGORITHMS In order to evaluate the generality of IDOL for localizing adversaries, we have chosen a set of representative localization algorithms ranging from nearest neighbor matching in signal space (RADAR ), to probability-based (Area-Based Probability ), and to multilateration (Bayesian Networks) . RADAR-Gridded: The RADAR-Gridded algorithm is a scene-matching localization algorithm extended from. RADAR- Gridded uses an interpolated signal map, which is built from a set of averaged RSS readings with known (x, y) locations. Given an observed RSS reading with an unknown location, RADAR returns the x, y of the nearest neighbor in the signal map to the one to localize, where "nearest" is defined as the Euclidean distance of RSS points in an N-dimensional signal space, where N is the number of landmarks. Area Based Probability (ABP): ABP also utilizes an interpolated signal map. Further, the experimental area is divided into a regular grid of equal sized tiles. ABP assumes the distribution of RSS for each landmark follows a Gaussian distribution with mean as the expected value of RSS reading vector s. ABP then computes the probability of the wireless device being at each tile Li, with i = 1...L, on the floor using Bayes’ rule: Given that the wireless node must be at exactly one tile satisfying ∑L i=1P(Li|s) = 1, ABP normalizes the probability and returns the most likely tiles/grids up to its confidence α. Bayesian Networks (BN): BN localization is a multilateration algorithm that encodes the signal-to-distance propagation model into the Bayesian Graphical Model for localization. Figure 2 shows the basic Bayesian Network used for our study. The vertices X and Y represent location; the vertex si is the RSS reading from the ith landmark; and the vertex Di represents the Euclidean distance between the location specified by X and Y and the ith landmark. The value of si follows a signal propagation model si = b0i+b1i logDi, where b0i, b1i are the parameters specific to the ith landmark The distance Di =√(X − xi)2 + (Y − yi)2 in turn depends on the location (X, Y ) of the measured signal and the coordinates (xi,
  • 4. International Journal of Innovative Research in Advanced Engineering ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 135 yi) of the ith landmark. The network models noise and outliers by modeling the si as a Gaussian distribution around the above propagation model, with variance τi: si~N(b0i + b1i logDi, τi). Through Markov Chain Monte Carlo (MCMC) simulation, BN returns the sampling distribution of the possible location of X and Y as the localization result. Fig 2. Bayasian graphical model in our study VII. CONCLUSIONS In this work, we proposed to use received signal strength based spatial correlation, a physical property associated with each wireless device that is hard to falsify and not reliant on cryptography as the basis for detecting spoofing attacks in wireless networks. We provided theoretical analysis of using the spatial correlation of RSS inherited from wireless nodes for attack detection. We derived the test statistic based on the cluster analysis of RSS readings. Our approach can both detect the presence of attacks as well as determine the number of adversaries. Determining the number of adversaries is a particularly challenging problem. We developed SILENCE, a mechanism that employs the minimum distance testing in addition to cluster analysis to achieve better accuracy of determining the number of attackers than other methods under study, such as Silhouette Plot and System Evolution that use cluster analysis alone. Additionally, when the training data are available, we explored using Support Vector Machines-based mechanism to further improve the accuracy of determining the number of attackers present in the system. Further, based on the number of attackers determined by our mechanisms, our integrated detection and localization system can localize any number of adversaries even when attackers using different transmission power levels. The performance of localizing adversaries achieves similar results as those under normal conditions, thereby, providing strong evidence of the effectiveness of our approach in detecting wireless spoofing attacks, determining the number of attackers and localizing adversaries REFERENCES [1] J. Bellardo and S. Savage, 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, Proc. USENIX Security Symp., pp. 15-28, 2003. [2] [2] F. Ferreri, M. Bernaschi, and L. Valcamonici, “Access Points Vulnerabilities to Dos Attacks in 802.11 Networks,” Proc. IEEE Wireless Comm. and Networking Conf., 2004. [3] [3] D. Faria and D. Cheriton, “Detecting Identity-Based Attacks in Wireless Networks Using Signalprints,” Proc. ACM Workshop Wireless Security (WiSe), Sept. 2006. [4] [4] Q. Li and W. Trappe, “Relationship-Based Detection of Spoofing- Related Anomalous Traffic in Ad Hoc Networks,” Proc. Ann. IEEE Comm. Soc. on IEEE and Sensor and Ad Hoc Comm. and Networks (SECON), 2006. [5] [5] B. Wu, J. Wu, E. Fernandez, and S. Magliveras, “Secure and Efficient Key Management in Mobile Ad Hoc Networks,” Proc. IEEE Int’l Parallel and Distributed Processing Symp. (IPDPS), 2005. [6] [6] A. Wool, “Lightweight Key Management for IEEE 802.11 Wireless Lans With Key Refresh and Host Revocation,” ACM/Springer Wireless Networks, vol. 11, no. 6, pp. 677-686, 2005. [7] [7] Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, “Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength,” Proc. IEEE INFOCOM, Apr. 2008 [8] J. Yang, Y. Chen, and W. Trappe, “Detecting spoofing attacks in mobile wireless environments,” in Proc. IEEE SECON, 2009. [9] J. Wright, “Detecting wireless LAN MAC address spoofing,” 2003, technical document. [Online]. Available: http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf [10] NS2 Tutorial http://www.isi.edu/nsnam/ns