Skip to main content

Detection and Localizing Multiple Spoofing Attackers

  • Chapter
  • First Online:
  • 390 Accesses

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

Abstract

Under a malicious spoofing attack, multiple adversaries may masquerade as the same identity and collaborate to launch a denial-of-service attack quickly. Therefore, it is important to further determine the number of attackers that masquerade as the same identity in the wireless network. Further, detecting the presence of identity-based attacks in the network provides first order information towards defending against attackers. Learning the physical location of the attackers allows the network administrators to further exploit a wide range of defense strategies. For example, we can physically visit multiple adversaries and eliminate it from the network. We then explore how to find the positions of the adversaries by integrating our attack detector into a real-time indoor localization system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. C. van Rijsbergen, Information Retrieval, Second Edition. Butterworths, 1979.

    Google Scholar 

  2. T. Fawcett, “An introduction to ROC analysis,” Pattern Recognition Letters, Elsevier, vol. 27, pp. 861–874, 2006.

    Article  Google Scholar 

  3. P. Rousseeuw, “Silhouettes: a graphical aid to the interpretation and validation of cluster analysis,” Journal of Computational and Applied Mathematics, vol. 20, no. 1, pp. 53–65, November 1987.

    Google Scholar 

  4. K. Wang, J. Zheng, J. Zhang, and J. Dong, “Estimating the number of clusters via system evolution for cluster analysis of gene expression data,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 5, pp. 848–853, 2009.

    Google Scholar 

  5. N. Cristianini and J. Shawe-Taylor, An introduction to support Vector Machines: and other kernel-based learning methods. Cambridge Univ Pr, 2000.

    Google Scholar 

  6. C.-C. Chang and C.-J. Lin, LIBSVM: a library for support vector machines, 2001, software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.

  7. V. Franc and V. Hlavác, “Multi-class support vector machine,” in International Conference on Pattern Recognition, vol. 16, 2002, pp. 236–239.

    Google Scholar 

  8. C. Hsu and C. Lin, “A comparison of methods for multiclass support vector machines,” IEEE transactions on Neural Networks, vol. 13, no. 2, pp. 415–425, 2002.

    Google Scholar 

  9. P. Bahl and V. N. Padmanabhan, “RADAR: An in-building RF-based user location and tracking system,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2000, pp. 775–784.

    Google Scholar 

  10. E. Elnahrawy, X. Li, and R. P. Martin, “The limits of localization using signal strength: A comparative study,” in Proceedings of the First IEEE International Conference on Sensor and Ad hoc Communcations and Networks (SECON 2004), Oct. 2004, pp. 406–414.

    Google Scholar 

  11. D. Madigan, E. Elnahrawy, R. Martin, W. Ju, P. Krishnan, and A. S. Krishnakumar, “Bayesian indoor positioning systems,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2005, pp. 324–331.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yingying Chen .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 The Author(s)

About this chapter

Cite this chapter

Yang, J., Chen, Y., Trappe, W., Cheng, J. (2014). Detection and Localizing Multiple Spoofing Attackers. In: Pervasive Wireless Environments: Detecting and Localizing User Spoofing. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-07356-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07356-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07355-2

  • Online ISBN: 978-3-319-07356-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics