Hybrid Fuzzy Based Intrusion Detection System for Wireless Local Area Networks (HFIDS)
Journal Title: Bonfring International Journal of Research in Communication Engineering - Year 2012, Vol 1, Issue 1
Abstract
The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networks, based on Fuzzy logic. In this Hybrid Intrusion Detection system, anomaly detection is performed using the Bayesian network technique and misuse detection is performed using the Support Vector Machine (SVM) technique. The overall decision of system is performed by the fuzzy logic. For anomaly detection using Bayesian network, each node has a monitoring agent and a classifier within it for its detection and a mobile agent for information collection. The anomaly is measured based on the naive Bayesian technique. For misuse detection using SVM, all the data that lie within the hyperplane are considered to be normal whereas the data that lie outside the hyperplane are considered to be intrusive. The outputs of both anomaly detection and misuse detection modules are applied by the fuzzy decision rules to perform the final decision making.
Authors and Affiliations
Moorthy M, Dr. S. Sathyabama
An Improved MAC Address Based Intrusion Detection and Prevention System in MANET Sybil Attacks
A Mobile Adhoc Network is a communication medium that does not rely on secure infrastructure .It is a group of independent mobile nodes that can transfer to communicate each other via radio waves. These networks are full...
Towards Realization of Large-Scale Botnet Probing Events
Today?s attack scenery is governed by Botnets. Botnet refer to a group of bots?a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious program...
An Efficient Real Time Query System for Public Transportation Service using Zigbee and RFID
In recent decades, the number of vehicles in India has increased enormously, which results in rigorous traffic congestion and pollution in urban areas, especially during peak hours. This paper describes an implementation...
An Enhanced Security Enabled Sharing of Protected Cloud Storage Services by Trapdoor Commitment Based on RSA Signature Assumption
Cloud computing is a technology which allows the users to share the data and the applications over the internet. An efficient sharing of secure cloud storage services (ESC) scheme allows the users to share the messages i...
A Systematic Study on Cyber Physical System
Cyber-physical systems (CPSs) are physical and engineered systems whose operations are monitored, coordinated, controlled and integrated by a computing and communication core. The economic and societal potential of such...