Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | Iraq | Volume 6 Issue 7, July 2017

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Due to the rapid development of software's and algorithms that attack wireless connections, as well as risky challenges which encounter the data passing through this connection with the development of the potential capabilities of intruders, urgent manage risks of this wireless connections arises which it became necessary to analysis and protect this data. This paper propose a compromising way between protecting data from eavesdropping with intruding and risks. The paper introduces a new type of cryptographic algorithm that minimize these risks. The proposed rules that process these risks adopted on fuzzy theory. The target packets captured for local area network using WIRESSHARK free source software, then tested, and results discussed which concludes that minimizing risk for this network in diagnosed cases can be achieved via controlling transmitted data via the proposed encryption system. Matlab Guide toolbox 2013 and Laptop with Intel processor I5 with RAM 8GB was used.

Keywords: Risk, Cryptography, Fuzzy, Packets, WLAN

Edition: Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Share this Article

How to Cite this Article?

Dr. Abdulkareeem Merhej Radhi, "Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175375, Volume 6 Issue 7, July 2017, 1006 - 1012

49 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Risk'

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2438 - 2440

Design and Determination of Feasible Centroid for Meeting from Multiple Geo-Points: A Review

Nikhita Jambhule, Jagdish Pimple

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, Indonesia, Volume 6 Issue 8, August 2017

Pages: 1983 - 1987

Cyclomatic Complexity Test Design Flowgraph Registration of Emergency Installation Patients in Wava Husada Hospital Using SEM

Handy Lala, Puguh Yudho Trisnanto, Adil Candra

Share this Article

Similar Articles with Keyword 'Cryptography'

Research Paper, Information Technology, India, Volume 6 Issue 12, December 2017

Pages: 1128 - 1130

Enhanced Security by Modifying Playfair Cipher

Amandeep Kaur, Tanisha Jain, Gurjyot Singh

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Comparative Studies, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 2013 - 2019

Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering

Prajna M.S., Sumana M.

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2443 - 2447

Separable Reversible Data Hiding In Image Using a Keyless Approach

Jitbahan Samanta, G. Sujatha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1043 - 104

Comparative Study of MAC Algorithms in Pervasive Computing Environment

P. Bakkiya Lakshmi, K. Kumar

Share this Article

Similar Articles with Keyword 'Fuzzy'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1783 - 1786

A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature?s Condition as Factor

Suyash Deore, Rohini Temkar

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1457 - 1462

Churn Prediction in Cloud with Fuzzy Boosted Trees

Navneet Kaur, Naseeb Singh, Pawansupreet Kaur

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 11, November 2016

Pages: 1608 - 1611

Academic Performance Evaluation and Prediction using SC-FCM Clustering Algorithm

Govinda Raj S S

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Similar Articles with Keyword 'Packets'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 825 - 828

An Efficient Rushing Attack Prevention Algorithm for MANET Using Random Route Selection

Aakanksha Jain, Samidha Dwivedi Sharma

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1312 - 1320

A High Speed, Delay Tolerant Hybrid MAC for Collision Free, Reliable Communication in Wireless Sensor Network

Prachi Pandey, Somesh Kumar Devangan

Share this Article

Research Paper, Information Technology, Egypt, Volume 3 Issue 5, May 2014

Pages: 654 - 664

Bat Swarm Algorithm for Wireless Sensor Networks Lifetime Optimization

Marwa Sharawi, E. Emary, Imane Aly Saroit, Hesham El-Mahdy

Share this Article

Similar Articles with Keyword 'WLAN'

Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 796 - 799

Implementation of Mobile To Mobile Calling through Wi-Fi

Vishal S. Kasat, Rakesh Pandit

Share this Article

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this Article
Top