Intrusion Detection in Wireless Network Using Fuzzy Rules
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Computer Networks now a days are becoming a basic needs of this era where information sharing is key element for growth. With such use, the level of mischievousness has also grown briskly. Intrusion Detection Systems (IDS) are deployed to annotate such elements of the network so that the normal operation of the network is continued. IDS analyses the network and uncovers the malicious activities from member of the network of from the outside network. The strategies normally deployed in the implementation of as IDS evaluate the network based on knowledge of the expert system. The decision making methodology in existing IDS are found to be accommodating very limited number of conditions. Our proposed system will be deploying Fuzzy Logic rules of Artificial Intelligence to take decisions on malicious activities in the network. Such a scheme aims to include maximum possible conditions as they occur in the network. This system will considered the algorithm of the information security management system based on soft computing, and will implement a prototype of the intrusion detection system (IDS) for a network

Keywords: Networksecurity, intrusion detection system, anomaly detection, Fuzzy Logic, acknowledgment ACK

Edition: Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Share this Article

How to Cite this Article?

Ketaki P. Bhusari, Swati G. Kale, "Intrusion Detection in Wireless Network Using Fuzzy Rules", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153322, Volume 4 Issue 4, April 2015, 1576 - 1580

112 PDF Views | 88 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'intrusion detection system'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 88 - 90

WSN: Various Attacks and IDS in WSN

Amol N. Rindhe, Sanjay V. Dhopte

Share this Article

Similar Articles with Keyword 'anomaly detection'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1142 - 1145

Intrusion Detection Using Data Mining Approach

Kamble Jayshree R., Rangdale S.P.

Share this Article

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Similar Articles with Keyword 'Fuzzy Logic'

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018

Pages: 593 - 598

Intelligent Agents Based Fuzzy Liquidity Management Technique for Mobile Money Transfer

Millicent Murithi, George Okeyo, Michael Kimwele

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1783 - 1786

A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature?s Condition as Factor

Suyash Deore, Rohini Temkar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Research Paper, Information Technology, India, Volume 2 Issue 11, November 2013

Pages: 66 - 70

Enhancing Recommendation on Customizable E-Commerce System with Association & Ranking

S. Saravanakumar, S. Diviya

Share this Article
Top