Hybrid Fuzzy Based Intrusion Detection System for Wireless Local Area Networks (HFIDS)
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 1, Issue 1
Abstract
The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networks, based on Fuzzy logic. In this Hybrid Intrusion Detection system, anomaly detection is performed using the Bayesian network technique and misuse detection is performed using the Support Vector Machine (SVM) technique. The overall decision of system is performed by the fuzzy logic. For anomaly detection using Bayesian network, each node has a monitoring agent and a classifier within it for its detection and a mobile agent for information collection. The anomaly is measured based on the naive Bayesian technique. For misuse detection using SVM, all the data that lie within the hyperplane are considered to be normal whereas the data that lie outside the hyperplane are considered to be intrusive. The outputs of both anomaly detection and misuse detection modules are applied by the fuzzy decision rules to perform the final decision making.
Authors and Affiliations
Moorthy M, Dr. S. Sathyabama
An Efficient Real Time Query System for Public Transportation Service using Zigbee and RFID
In recent decades, the number of vehicles in India has increased enormously, which results in rigorous traffic congestion and pollution in urban areas, especially during peak hours. This paper describes an implementation...
Hybrid Fuzzy Based Intrusion Detection System for Wireless Local Area Networks (HFIDS)
The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to t...
Opportunistic Channel Access Algorithm Based on Hidden Semi Markov Model for Cognitive Radio Networks
Future generation cellular networks highly depend on Cognitive radio due to its capability to handle the primary user channel utilization. However, channel sensing and allocation for secondary user are the major factors...
Study of Scattering Parameters and Gain of two Longitudinal Slots of Same Electrical Lengths Milled on two Waveguides for Series and Shunt Slot Array Planar Antenna
This paper presents a study of two longitudinal slots of same electrical lengths milled on two waveguides for series and shunt slot array planar antenna. Initially single longitudinal slot element is milled on waveguide...
Improving Throughput and Controlling Congestion Collapse in Mobile Ad Hoc Networks
Mobile ad hoc networks are collections of mobile nodes that can dynamically form temporary networks without the need for pre-existing network infrastructure or centralized administration. These nodes can be arbitrarily l...