IJCTT-International Journal of Computer Trends and Technology
Spoofing attack which easily attack the network and reduce the performance of the network. In this paper, spoofing attacks are detected, finding the number of attackers that masquerade the node identity, localizing the entire attackers node and calculate the speed of a node, by using RSS (Received Signal Strength) for spoofing detection. The number of attacker is determined by cluster-based method. Support Vector Machines (SVM) is to improve the accuracy of finding number of attackers. Evaluate the authors' method in two real office, an 802.11 (Wi-Fi) network and an 802.15.4 (ZigBee) network. Their method gives over 90 percent of hit rate.