Abstract
Under a malicious spoofing attack, multiple adversaries may masquerade as the same identity and collaborate to launch a denial-of-service attack quickly. Therefore, it is important to further determine the number of attackers that masquerade as the same identity in the wireless network. Further, detecting the presence of identity-based attacks in the network provides first order information towards defending against attackers. Learning the physical location of the attackers allows the network administrators to further exploit a wide range of defense strategies. For example, we can physically visit multiple adversaries and eliminate it from the network. We then explore how to find the positions of the adversaries by integrating our attack detector into a real-time indoor localization system.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
C. van Rijsbergen, Information Retrieval, Second Edition. Butterworths, 1979.
T. Fawcett, “An introduction to ROC analysis,” Pattern Recognition Letters, Elsevier, vol. 27, pp. 861–874, 2006.
P. Rousseeuw, “Silhouettes: a graphical aid to the interpretation and validation of cluster analysis,” Journal of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53–65, November 1987.
K. Wang, J. Zheng, J. Zhang, and J. Dong, “Estimating the number of clusters via system evolution for cluster analysis of gene expression data,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 5, pp. 848–853, 2009.
N. Cristianini and J. Shawe-Taylor, An introduction to support Vector Machines: and other kernel-based learning methods. Cambridge Univ Pr, 2000.
C.-C. Chang and C.-J. Lin, LIBSVM: a library for support vector machines, 2001, software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
V. Franc and V. Hlavác, “Multi-class support vector machine,” in International Conference on Pattern Recognition, vol. 16, 2002, pp. 236–239.
C. Hsu and C. Lin, “A comparison of methods for multiclass support vector machines,” IEEE transactions on Neural Networks, vol. 13, no. 2, pp. 415–425, 2002.
P. Bahl and V. N. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2000, pp. 775–784.
E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study,” in Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), Oct. 2004, pp. 406–414.
D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A. S. Krishnakumar, “Bayesian indoor positioning systems,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2005, pp. 324–331.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 The Author(s)
About this chapter
Cite this chapter
Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Detection and Localizing Multiple Spoofing Attackers. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-07356-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07355-2
Online ISBN: 978-3-319-07356-9
eBook Packages: Computer ScienceComputer Science (R0)