Intrusion Detection in Wireless Network Using Fuzzy Rules
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4
Abstract
Computer Networks now a days are becoming a basic needs of this era where information sharing is key element for growth. With such use, the level of mischievousness has also grown briskly. Intrusion Detection Systems (IDS) are deployed to annotate such elements of the network so that the normal operation of the network is continued. IDS analyses the network and uncovers the malicious activities from member of the network of from the outside network. The strategies normally deployed in the implementation of as IDS evaluate the network based on knowledge of the expert system. The decision making methodology in existing IDS are found to be accommodating very limited number of conditions. Our proposed system will be deploying Fuzzy Logic rules of Artificial Intelligence to take decisions on malicious activities in the network. Such a scheme aims to include maximum possible conditions as they occur in the network. This system will considered the algorithm of the information security management system based on soft computing, and will implement a prototype of the intrusion detection system (IDS) for a network
Parallel Content Matching In Publish/Subscribe Systems
Publish/Subscribe (Pub/Sub) system is the more optimized implementation of complex event processing system, in which user gives the interest (subscriptions) and some other party publishes the event (e.g. Stock quotes). T...
Autism and Seisures in Children Admitted in a Tertiary Hospital
Autism is associated with epilepsy in early childhood, with evidence suggesting that individuals with both autism and more severecognitive impairment are at higher risk. The frequency of an abnormal electroencephalogram...
Secure and Efficient Data Sharing for Decentralized DTN
"Nowadays, there have been increasing demands and concerns for distributed data security, One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updat...
Management of Occupational Stress among Pastors of Friends Church in Nairobi County, Kenya
"ABSTRACT The demands for increased effectiveness and efficiency within the Friends church puts a lot of pressure on few overburdened pastors, considering the fact that they act as vital links between the Christians, c...
SIP Over NON-TLS vs TLS Environment
SIP is a dominant signalling protocol that is used over various transport protocols for a successful session establishment along with data/audio/video transfer. This paper gives a survey on SIP over both NON-TLS and TLS...