Design and Development of Web-based Expert System to Detect Network Intrusion
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
It is very important that the security mechanisms of a system are designed so as to prevent unauthorized access to system resources and data. However, completely preventing breaches of security appear, at present, unrealistic. We can, however, try to detect these intrusion attempts so that action may be taken to repair the damage later. Expert system (ES) has been proposed to be the beter solution of reasoning on the existing problems on the basis of expert knowledge. Experts ‘brain’ are stored in a database called a knowledge base and then made the rules to give decisions in accordance with the knowledge base.In this research, knowledge base taken from the expert and journal. Expert system will be used to determine or predict the occurrence of intrusion detection systems based on the feature above. By simple means, any data packet is going to be examined by ES, which initially stores knowledge about intrusion characteristics from database as variables. The result of this research is anomaly packet already detected by the application according to the rule based on the expert and the journal.
Authors and Affiliations
Asghaiyer Mohamed Asghaiyer
A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing
Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attac...
Improved Product Ranking For Recommendation Systems
Abstract: In the new area of information technology, the most important and recognition machine learning technique is Recommender engine. Vast numbers of knowledge discovery techniques are applied by recommender system t...
An Intelligent Decision Support System Using Adaptive Network-Based Fuzzy Inference System (ANFIS) For Choosing Suitable Bank Loan Installments
Abstract : Choosing the best bank to obtain a loan from has become a dilemma for many loan applicants; Thus the need to automate the process throughout establishing an intelligent decision support system (IDSS) to...
A Secure QOS Distributed Routing Protocol for Hybrid WirelessNetworks
Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service(QoS) requirements in real time transmission for wireless application. But it stream including critical missio...
Providing The Security Against The DDOS Attack In Mobile AdHoc Networks
Abstract: The extensive applications of Mobile ad hoc networks are in civilian and military. In the MANETsnodes are joining to any point and leave the network at any point of time. This generic characteristic of MA...