Downloads: 147 | Views: 325
Research Paper | Information Technology | Iraq | Volume 6 Issue 7, July 2017 | Popularity: 6.7 / 10
Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules
Dr. Abdulkareeem Merhej Radhi
Abstract: Due to the rapid development of software's and algorithms that attack wireless connections, as well as risky challenges which encounter the data passing through this connection with the development of the potential capabilities of intruders, urgent manage risks of this wireless connections arises which it became necessary to analysis and protect this data. This paper propose a compromising way between protecting data from eavesdropping with intruding and risks. The paper introduces a new type of cryptographic algorithm that minimize these risks. The proposed rules that process these risks adopted on fuzzy theory. The target packets captured for local area network using WIRESSHARK free source software, then tested, and results discussed which concludes that minimizing risk for this network in diagnosed cases can be achieved via controlling transmitted data via the proposed encryption system. Matlab Guide toolbox 2013 and Laptop with Intel processor I5 with RAM 8GB was used.
Keywords: Risk, Cryptography, Fuzzy, Packets, WLAN
Edition: Volume 6 Issue 7, July 2017
Pages: 1006 - 1012
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024
Pages: 658 - 660Systematic Selection of Antipsychotics in Schizophrenia: A Binary Search Approach Based on Efficacy and Side Effects
Kunal Dhanda, Sweta Sehrawat
Downloads: 0
Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024
Pages: 661 - 664Revolutionizing Public Health: A Blockchain - Based System for Secure Genetic and Medical Data Management
Kunal Dhanda, Sweta Sehrawat
Downloads: 0
Review Papers, Information Technology, United States of America, Volume 13 Issue 6, June 2024
Pages: 1741 - 1747Risk Management and Compliance with Business Intelligence in Banking
Pranay Mungara
Downloads: 0
Informative Article, Information Technology, India, Volume 11 Issue 3, March 2022
Pages: 1616 - 1619Addressing Vendor Lock-In in SaaS: Risks, Implications, and Modern Strategies
Goutham Sabbani
Downloads: 0
Research Paper, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 1415 - 1423Quantum Computing and Cloud: Future Prospects - Exploration of Quantum Computing Capabilities in the Cloud
Sandeep Chinamanagonda