Hybrid Fuzzy Based Intrusion Detection System for Wireless Local Area Networks (HFIDS)
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 1, Issue 1
Abstract
The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networks, based on Fuzzy logic. In this Hybrid Intrusion Detection system, anomaly detection is performed using the Bayesian network technique and misuse detection is performed using the Support Vector Machine (SVM) technique. The overall decision of system is performed by the fuzzy logic. For anomaly detection using Bayesian network, each node has a monitoring agent and a classifier within it for its detection and a mobile agent for information collection. The anomaly is measured based on the naive Bayesian technique. For misuse detection using SVM, all the data that lie within the hyperplane are considered to be normal whereas the data that lie outside the hyperplane are considered to be intrusive. The outputs of both anomaly detection and misuse detection modules are applied by the fuzzy decision rules to perform the final decision making.
Authors and Affiliations
Moorthy M, Dr. S. Sathyabama
An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks
A Mobile Adhoc Network is a communication medium that does not rely on secure infrastructure .It is a group of independent mobile nodes that can transfer to communicate each other via radio waves. These networks are full...
Opportunistic Channel Access Algorithm Based on Hidden Semi Markov Model for Cognitive Radio Networks
Future generation cellular networks highly depend on Cognitive radio due to its capability to handle the primary user channel utilization. However, channel sensing and allocation for secondary user are the major factors...
Data Integrity and Dynamic Storage Way in Cloud Computing Resonance and Parametric Analysis of Planar Broad-Wall Longitudinal Slot Array Antennas
It is not an easy task to securely maintain all essential data where it has the need in many applications for clients in cloud. To maintain our data in cloud, it may not be fully trustworthy because client doesn?t have c...
Design and Development of Gaussian Minimum Shift Keying (GMSK) Demodulator for Satellite Communication
This paper discusses DSP based implementation of Gaussian Minimum Shift Keying (GMSK) demodulator using Polarity type Costas loop. The demodulator consists of a Polarity type Costas loop for carrier recovery, data recove...
A Systematic Study on Cyber Physical System
Cyber-physical systems (CPSs) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. The economic and societal potential of such...