International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Technology | Iraq | Volume 6 Issue 7, July 2017

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Due to the rapid development of software's and algorithms that attack wireless connections, as well as risky challenges which encounter the data passing through this connection with the development of the potential capabilities of intruders, urgent manage risks of this wireless connections arises which it became necessary to analysis and protect this data. This paper propose a compromising way between protecting data from eavesdropping with intruding and risks. The paper introduces a new type of cryptographic algorithm that minimize these risks. The proposed rules that process these risks adopted on fuzzy theory. The target packets captured for local area network using WIRESSHARK free source software, then tested, and results discussed which concludes that minimizing risk for this network in diagnosed cases can be achieved via controlling transmitted data via the proposed encryption system. Matlab Guide toolbox 2013 and Laptop with Intel processor I5 with RAM 8GB was used.

Keywords: Risk, Cryptography, Fuzzy, Packets, WLAN

Edition: Volume 6 Issue 7, July 2017

Pages: 1006 - 1012


How to Cite this Article?

Dr. Abdulkareeem Merhej Radhi, "Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175375, Volume 6 Issue 7, July 2017, 1006 - 1012

14 PDF Views | 52 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Risk'

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1868 - 1870

A Survey on Privacy Assurance in Personalized Web Search

Abhilasha V. Biradar, K. B. Sadafale

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1470 - 1473

The Heartbleed Bug: An Open Secure Sockets Layer Vulnerability

Thabiso Peter Mpofu, Noe Elisa, Nicholaus Gati

Share this article

Research Paper, Information Technology, Saudi Arabia, Volume 3 Issue 12, December 2014

Pages: 1577 - 1583

Health Information Technology (HIT) Risk-Based Regulatory Framework for Informatics: Disaster Recovery and Business Continuity Plan

Eng.Adil Fagiri Babiker Fagiri, Dr. Hani ZakariaAsfour, Dr. Manal Fouad Amer

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2438 - 2440

Design and Determination of Feasible Centroid for Meeting from Multiple Geo-Points: A Review

Nikhita Jambhule, Jagdish Pimple

Share this article

Similar Articles with Keyword 'Cryptography'

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 8, August 2014

Pages: 2009 - 2016

(t, n) Threshold Scheme to Enhance the Security of the Password Repository

Malladi Venkata Naga Kiranmai, Avinab Marahatta, K. Suresh Babu

Share this article

Similar Articles with Keyword 'Fuzzy'

Research Paper, Information Technology, India, Volume 5 Issue 11, November 2016

Pages: 1608 - 1611

Academic Performance Evaluation and Prediction using SC-FCM Clustering Algorithm

Govinda Raj S S

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1457 - 1462

Churn Prediction in Cloud with Fuzzy Boosted Trees

Navneet Kaur, Naseeb Singh, Pawansupreet Kaur

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1783 - 1786

A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature?s Condition as Factor

Suyash Deore, Rohini Temkar

Share this article

Similar Articles with Keyword 'Packets'

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this article

Research Paper, Information Technology, Egypt, Volume 3 Issue 5, May 2014

Pages: 654 - 664

Bat Swarm Algorithm for Wireless Sensor Networks Lifetime Optimization

Marwa Sharawi, E. Emary, Imane Aly Saroit, Hesham El-Mahdy

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 825 - 828

An Efficient Rushing Attack Prevention Algorithm for MANET Using Random Route Selection

Aakanksha Jain, Samidha Dwivedi Sharma

Share this article

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1312 - 1320

A High Speed, Delay Tolerant Hybrid MAC for Collision Free, Reliable Communication in Wireless Sensor Network

Prachi Pandey, Somesh Kumar Devangan

Share this article

Similar Articles with Keyword 'WLAN'

Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 796 - 799

Implementation of Mobile To Mobile Calling through Wi-Fi

Vishal S. Kasat, Rakesh Pandit

Share this article

Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017

Pages: 1006 - 1012

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi

Share this article

Top