Loading

Spoofing – An Attack on Node Identity and its Remedial Research
A. Udhay Kumar1, M Ganesh Raja2
1Dr. A. Udhay Kumar, Assistant Professor, Department of Computer Science, Agurchand Manmull Jain College, Meenambakkam, Chennai (Tamil Nadu), India.
2M Ganesh Raja, Assistant Professor, Department of Computer Applications, Agurchand Manmull Jain College, Chennai (Tamil Nadu), India.
Manuscript received on 30 September 2019 | Revised Manuscript received on 12 November 2019 | Manuscript Published on 22 November 2019 | PP: 1497-1500 | Volume-8 Issue-6S3 September 2019 | Retrieval Number: F12660986S319/19©BEIESP | DOI: 10.35940/ijeat.F1266.0986S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Network is the prime demand of today’s outreaching development in every sector. Starting from a small institute to big sectors like Industry, Organization, Defense, Ministry and Medicine all are dependent on network to maintain their data transmission efficiently. It provides the great ease of operation and information sharing. As we know with greater ease, much greater threat is handy. With the network also a big threat is associated i.e. network attacks. There are some major attacks which can violate and damage the whole network system and its integrity. Wireless attacks are very common and an intruder with vast knowledge of network administration and modification can easily find the loopholes in the security systems. There are different attacks like Denial of Services (DoS), Sniffer, Password Based, Spoofing, Eavesdropping etc. but the most dangerous of all is spoofing. Spoofing is an attack type in that the intruder impersonates as original identity and use their identity to achieve the intrusion goal. The attack is so severe because the user, even after seeing the intruder cannot identify it as the external body and take immediate action. The intruder enters the network and steals all the information as a legitimate user and damages the integrity of network. We propose here to find the intruder by using the energy consumption by nodes using the dead, asleep and active nodes. We can localize the location of intruders in the network using this technique. We use Received Signal Strength (RSS) to see the energy consumption of each node as the fluctuation of intruder node will be different from genuine nodes.
Keywords: Received Signal Strength (RSS), Denial of Services (DoS), Sniffer, Password Based, Spoofing, Eavesdropping.
Scope of the Article: Signal and Speech Processing