Main Article Content

Abstract

In Network the drastic invention was brought up abig chances in wireless network. This Project has been evolved as one of the promising technology based on implementation of wireless network. Providing mobility, flexible infrastructure, fast and low cost deployment are the key features of EAACK. This is being most widely used wireless technology has limited security against network attacks. Dynamic configurability adds flexibility to Network but it makes it vulnerable to attacks like do’s, Wormhole, Man-In-Middle Attack, IP Spoofing Attacks. In this paper, an intrusion detection system was extended to Enhanced Adaptive ACKnowledgement (E-EAACK) and it will detect the localize and the intrusion of the attacker. This system consists of some security components like prevention, detection and reaction. Specially designed for NETWORK, E-EAACK serves in detection of malicious behavior without much affecting Network Performance. In order to detect and localize the multiple IP Spoofing Attacks. We propose, the use of digital signature for authentication of nodes and S-ACK scheme for detecting anomalous behavior in network. In implementation of GADE model for the detection of attacker and IDOL framework can be localized to the intruder and makes E-EAACK an effective security in solution for network.

Article Details

How to Cite
Dr.D.Thilagavathy, J.Janwhisrivastava, & V.Kowzalya. (2021). Detection and neutralizing multiple spoofing attackers using PRR and IAT. International Journal of Intellectual Advancements and Research in Engineering Computations, 7(1), 01–07. Retrieved from https://ijiarec.com/ijiarec/article/view/155