SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING
ATTACKERS IN WIRELESS NETWORKS

ABSTRACT:
In this paper, we propose to use spatial information, a physical property associated with each
node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing
attacks; 2) determining the number of attackers when multiple adversaries masquerading as the
same node identity; and 3) localizing multiple adversaries.

We propose to use the spatial correlation of received signal strength (RSS) inherited from
wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the
number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed
to determine the number of attackers.

We explore using the Support Vector Machines (SVM) method to further improve the accuracy
of determining the number of attackers. In addition, we developed an integrated detection and
localization system that can localize the positions of multiple attackers. We evaluated our
techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee)
network in two real office buildings.

Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate
and Precision when determining the number of attackers. Our localization results using a
representative set of algorithms provide strong evidence of high accuracy of localizing multiple
adversaries.

More Related Content

What's hot

Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...Ecway Technologies
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks securityelango30
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...Roshith S Pai
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksecway
 

What's hot (8)

Dotnet detection and localization of multiple spoofing attackers in wireless...
Dotnet  detection and localization of multiple spoofing attackers in wireless...Dotnet  detection and localization of multiple spoofing attackers in wireless...
Dotnet detection and localization of multiple spoofing attackers in wireless...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
SECURE AND EFFICIENT DATA TRANSMISSION FOR CLUSTER-BASED WIRELESS SENSOR NETW...
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 

Viewers also liked

Presentation de secretaire d'air france industrie
Presentation de secretaire d'air france industriePresentation de secretaire d'air france industrie
Presentation de secretaire d'air france industriefr-au-bureau
 
Dotnet minimally supervised novel relation extraction using a latent relatio...
Dotnet  minimally supervised novel relation extraction using a latent relatio...Dotnet  minimally supervised novel relation extraction using a latent relatio...
Dotnet minimally supervised novel relation extraction using a latent relatio...Ecwaytech
 
Electrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringElectrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringEcwayt
 
Dotnet on exploiting transient social contact patterns for data forwarding i...
Dotnet  on exploiting transient social contact patterns for data forwarding i...Dotnet  on exploiting transient social contact patterns for data forwarding i...
Dotnet on exploiting transient social contact patterns for data forwarding i...Ecwaytech
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysisEcwaytech
 
Dotnet successive interference cancellation carving out mac layer opportunities
Dotnet  successive interference cancellation carving out mac layer opportunitiesDotnet  successive interference cancellation carving out mac layer opportunities
Dotnet successive interference cancellation carving out mac layer opportunitiesEcwaytech
 
Dotnet simple hybrid and incremental postpruning techniques for rule induction
Dotnet  simple hybrid and incremental postpruning techniques for rule inductionDotnet  simple hybrid and incremental postpruning techniques for rule induction
Dotnet simple hybrid and incremental postpruning techniques for rule inductionEcwaytech
 
Отчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 годаОтчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 годаАлексей Арешев
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...Ecwaytech
 

Viewers also liked (12)

Psicopedagogìa
PsicopedagogìaPsicopedagogìa
Psicopedagogìa
 
Presentation de secretaire d'air france industrie
Presentation de secretaire d'air france industriePresentation de secretaire d'air france industrie
Presentation de secretaire d'air france industrie
 
Dotnet minimally supervised novel relation extraction using a latent relatio...
Dotnet  minimally supervised novel relation extraction using a latent relatio...Dotnet  minimally supervised novel relation extraction using a latent relatio...
Dotnet minimally supervised novel relation extraction using a latent relatio...
 
Storybird
StorybirdStorybird
Storybird
 
Electrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoringElectrical thermal plant boiler temperature and water level monitoring
Electrical thermal plant boiler temperature and water level monitoring
 
Dotnet on exploiting transient social contact patterns for data forwarding i...
Dotnet  on exploiting transient social contact patterns for data forwarding i...Dotnet  on exploiting transient social contact patterns for data forwarding i...
Dotnet on exploiting transient social contact patterns for data forwarding i...
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysis
 
Dotnet successive interference cancellation carving out mac layer opportunities
Dotnet  successive interference cancellation carving out mac layer opportunitiesDotnet  successive interference cancellation carving out mac layer opportunities
Dotnet successive interference cancellation carving out mac layer opportunities
 
Dotnet simple hybrid and incremental postpruning techniques for rule induction
Dotnet  simple hybrid and incremental postpruning techniques for rule inductionDotnet  simple hybrid and incremental postpruning techniques for rule induction
Dotnet simple hybrid and incremental postpruning techniques for rule induction
 
Отчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 годаОтчет об исполнении бюджета за I квартал 2015 года
Отчет об исполнении бюджета за I квартал 2015 года
 
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...Dotnet  modeling and optimizing the performance- security tradeoff on d-ncs u...
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
 
Página 19
Página 19Página 19
Página 19
 

Similar to Dotnet detection and localization of multiple spoofing attackers in wireless networks

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...ecwayerode
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...Ecway Technologies
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksecway
 
A030101001006
A030101001006A030101001006
A030101001006theijes
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploitsamiable_indian
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...SBGC
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecuritySBGC
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 

Similar to Dotnet detection and localization of multiple spoofing attackers in wireless networks (20)

Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...
 
Java detection and localization of multiple spoofing attackers in wireless n...
Java  detection and localization of multiple spoofing attackers in wireless n...Java  detection and localization of multiple spoofing attackers in wireless n...
Java detection and localization of multiple spoofing attackers in wireless n...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
I1802046780
I1802046780I1802046780
I1802046780
 
A030101001006
A030101001006A030101001006
A030101001006
 
Finding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection ExploitsFinding Diversity In Remote Code Injection Exploits
Finding Diversity In Remote Code Injection Exploits
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
IJSRED-V2I5P18
IJSRED-V2I5P18IJSRED-V2I5P18
IJSRED-V2I5P18
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
 
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network SecurityIEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
D0952126
D0952126D0952126
D0952126
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 

Dotnet detection and localization of multiple spoofing attackers in wireless networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS IN WIRELESS NETWORKS ABSTRACT: In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the number of attackers when multiple adversaries masquerading as the same node identity; and 3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multiclass detection problem. Cluster-based mechanisms are developed to determine the number of attackers. We explore using the Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90 percent Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.