International Conference on Information Communication and Embedded Systems (ICICES2014) 2014
DOI: 10.1109/icices.2014.7033894
|View full text |Cite
|
Sign up to set email alerts
|

Cluster-based mechanisms in support vector machine to integrate and detect spoofing

Abstract: Wireless spoofing attack is mainly masquerades the IP address and degrade the performance of the network. In Existing an approach to address the potential spoofing attacks employ cryptographic schemes and requires key dissemination, Protection, and maintenance mechanisms. Although the cryptographic authentication approaches are not always desirable because of their overhead requirements. In this paper, Discover the presence of spoofing attack based on network adapter. Based on support vector machine (SVM) to c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 6 publications
(1 reference statement)
0
0
0
Order By: Relevance