Research Paper | Information Technology | Iraq | Volume 6 Issue 7, July 2017
Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules
Dr. Abdulkareeem Merhej Radhi
Due to the rapid development of software's and algorithms that attack wireless connections, as well as risky challenges which encounter the data passing through this connection with the development of the potential capabilities of intruders, urgent manage risks of this wireless connections arises which it became necessary to analysis and protect this data. This paper propose a compromising way between protecting data from eavesdropping with intruding and risks. The paper introduces a new type of cryptographic algorithm that minimize these risks. The proposed rules that process these risks adopted on fuzzy theory. The target packets captured for local area network using WIRESSHARK free source software, then tested, and results discussed which concludes that minimizing risk for this network in diagnosed cases can be achieved via controlling transmitted data via the proposed encryption system. Matlab Guide toolbox 2013 and Laptop with Intel processor I5 with RAM 8GB was used.
Keywords: Risk, Cryptography, Fuzzy, Packets, WLAN
Edition: Volume 6 Issue 7, July 2017
Pages: 1006 - 1012
How to Cite this Article?
Dr. Abdulkareeem Merhej Radhi, "Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20175375, Volume 6 Issue 7, July 2017, 1006 - 1012
104 PDF Views | 132 PDF Downloads
Similar Articles with Keyword 'Risk'
Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020
Pages: 881 - 889Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya
Kanuku Musyoku, Shitanda Douglas, Nganu Margaret
Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014
Pages: 1137 - 1140A Literature Survey on Virtualization Security Threats in Cloud Computing
Brona Shah, Jignesh Vania
Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016
Pages: 1868 - 1870A Survey on Privacy Assurance in Personalized Web Search
Abhilasha V. Biradar, K. B. Sadafale
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 2473 - 2475Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall
Laimayum Bulbul Sharma, J. Dharani
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1204 - 1206Identity Management as a Service in Cloud
Rahul Relan, Savaridassan P.
Similar Articles with Keyword 'Cryptography'
Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015
Pages: 1984 - 1987Lossless and Reversible Data Hiding in Asymmetric Cryptography
Prashant Gholve, H. A. Hingoliwala
Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015
Pages: 2030 - 2033Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem
Fatima Joselyn Mystica, Gopalakrishnan Prakash
Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015
Pages: 1458 - 1459Remote Voting System Using Extended Visual Cryptography
Tridib Chakraborty, Mizan Md Chowdhury
Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014
Pages: 2849 - 2851A Survey on Secure Mechanism for Wireless Sensor Networks
Tabbasum Sajjan Magdum, Y.B.Gurav
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1043 - 104Comparative Study of MAC Algorithms in Pervasive Computing Environment
P. Bakkiya Lakshmi, K. Kumar
Similar Articles with Keyword 'Fuzzy'
Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018
Pages: 593 - 598Intelligent Agents Based Fuzzy Liquidity Management Technique for Mobile Money Transfer
Millicent Murithi, George Okeyo, Michael Kimwele
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti
Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1783 - 1786A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature?s Condition as Factor
Suyash Deore, Rohini Temkar
Research Paper, Information Technology, India, Volume 5 Issue 11, November 2016
Pages: 1608 - 1611Academic Performance Evaluation and Prediction using SC-FCM Clustering Algorithm
Govinda Raj S S
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1457 - 1462Churn Prediction in Cloud with Fuzzy Boosted Trees
Navneet Kaur, Naseeb Singh, Pawansupreet Kaur
Similar Articles with Keyword 'Packets'
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1127 - 1130Analysis and Data Retrieval by Filtering Packets in High Speed Routers
Indumathi, K. Kumar
Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015
Pages: 3058 - 3063The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung
Yudi Priyadi, Suhardi
M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 825 - 828An Efficient Rushing Attack Prevention Algorithm for MANET Using Random Route Selection
Aakanksha Jain, Samidha Dwivedi Sharma
Research Paper, Information Technology, Egypt, Volume 3 Issue 5, May 2014
Pages: 654 - 664Bat Swarm Algorithm for Wireless Sensor Networks Lifetime Optimization
Marwa Sharawi, E. Emary, Imane Aly Saroit, Hesham El-Mahdy
Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1312 - 1320A High Speed, Delay Tolerant Hybrid MAC for Collision Free, Reliable Communication in Wireless Sensor Network
Prachi Pandey, Somesh Kumar Devangan
Similar Articles with Keyword 'WLAN'
Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015
Pages: 796 - 799Implementation of Mobile To Mobile Calling through Wi-Fi
Vishal S. Kasat, Rakesh Pandit
Research Paper, Information Technology, Iraq, Volume 6 Issue 7, July 2017
Pages: 1006 - 1012Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules
Dr. Abdulkareeem Merhej Radhi