Design and Development of Web-based Expert System to Detect Network Intrusion
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
It is very important that the security mechanisms of a system are designed so as to prevent unauthorized access to system resources and data. However, completely preventing breaches of security appear, at present, unrealistic. We can, however, try to detect these intrusion attempts so that action may be taken to repair the damage later. Expert system (ES) has been proposed to be the beter solution of reasoning on the existing problems on the basis of expert knowledge. Experts ‘brain’ are stored in a database called a knowledge base and then made the rules to give decisions in accordance with the knowledge base.In this research, knowledge base taken from the expert and journal. Expert system will be used to determine or predict the occurrence of intrusion detection systems based on the feature above. By simple means, any data packet is going to be examined by ES, which initially stores knowledge about intrusion characteristics from database as variables. The result of this research is anomaly packet already detected by the application according to the rule based on the expert and the journal.
Authors and Affiliations
Asghaiyer Mohamed Asghaiyer
Modified Rabin Cryptosystem through Advanced Key Distribution System
Abstract: In this paper, an asymmetric cryptosystem Rabin Cryptosystem has been modified by adding an advanced message authentication system with it. The proposed modified Rabin Cryptosystem is a combination of sym...
Efficient IOT Based Sensor Data Analysis in Wireless SensorNetworks with Cloud
Abstract: The improvement of wireless sensor network has offered move to public sensing as it is vibrantsharing model. This creative energy can be clarified under the Internet of Things (IoT) to adopt differentinformatio...
Enhancement of Data Hiding Capacity in Audio Steganography
Nowadays, a lot of applications are Internet-based and demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure...
Next Generation Genetic Algorithm for Maximum Clique Problem
Abstract: Given a graph, in the maximum clique problem, one desires to find the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is comput...
A Survey of Clustering Scheme for Manets
Abstract: Mobile adhoc network is a network in which nodes are dynamic in nature and has limited bandwidth and battery power. They are used in different situations such as military services, medical or embedded applicati...