Downloads: 114 | Views: 287
Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015 | Popularity: 7 / 10
Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari, Swati G. Kale
Abstract: Computer Networks now a days are becoming a basic needs of this era where information sharing is key element for growth. With such use, the level of mischievousness has also grown briskly. Intrusion Detection Systems (IDS) are deployed to annotate such elements of the network so that the normal operation of the network is continued. IDS analyses the network and uncovers the malicious activities from member of the network of from the outside network. The strategies normally deployed in the implementation of as IDS evaluate the network based on knowledge of the expert system. The decision making methodology in existing IDS are found to be accommodating very limited number of conditions. Our proposed system will be deploying Fuzzy Logic rules of Artificial Intelligence to take decisions on malicious activities in the network. Such a scheme aims to include maximum possible conditions as they occur in the network. This system will considered the algorithm of the information security management system based on soft computing, and will implement a prototype of the intrusion detection system (IDS) for a network
Keywords: Networksecurity, intrusion detection system, anomaly detection, Fuzzy Logic, acknowledgment ACK
Edition: Volume 4 Issue 4, April 2015
Pages: 1576 - 1580
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 9 Issue 5, May 2020
Pages: 1866 - 1869Ensuring Data Integrity in Big Data Ingestion: Techniques and Best Practices for Data Quality Assurance
Sree Sandhya Kona
Downloads: 10 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10
Review Papers, Information Technology, United States of America, Volume 13 Issue 8, August 2024
Pages: 394 - 398Securing Justice: Enhancing Cybersecurity in the Criminal Justice System
Deepthi Kallahakalu Vijay Dev
Downloads: 95
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti
Downloads: 99
Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015
Pages: 1783 - 1786A Fuzzy Reasoning Approach to Determine Various Optimize Paths between Two Locations on a Transport Network Including Nature's Condition as Factor
Suyash Deore, Rohini Temkar
Downloads: 106
Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018
Pages: 593 - 598Intelligent Agents Based Fuzzy Liquidity Management Technique for Mobile Money Transfer
Millicent Murithi, George Okeyo, Michael Kimwele