USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS solution for their network. There is never one solution that works for everything so user has to compare the capabilities of each along with budget, knowledge and needs to find one that works best for them. This paper provides a user requirements weight based approach to IDS selection for WLAN. In this approach first all possible user WIDS requirements and WIDS metrics are listed, then for each WIDS requirement we find the concern metric(s). User lists their WIDS requirements in a partial ordering from least important to most. Requirements are usually stated in positive form or converted to the positive form. Next, the first requirement (i.e. least important) is assigned the lowest weight (e.g., one). Other requirements may be assigned increasing weights in proportion to their relative importance. Once the requirements are weighted, each WIDS metric is assigned a weight that is equal to the sum of the weights of the requirements it contributes to. WIDS metrics are arranged in descending order where metric with the highest weight is at the top. Appropriate WIDS tool may be selected after matching the metrics weight and WIDS features. In the end of the paper we discuss scope for the future work in this area.
Authors and Affiliations
Rupinder Singh , Dr. Jatinder Singh
“Quantum Computing” Future of computing
Quantum computing studies theoretical computation systems (quantum computers) that make direct use of quantum- echanical phenomena, such as superposition and entanglement, to perform operations on data. This paper will f...
Algorithms for Mining Association Rules: An Overview
In this paper, we provide the basic concepts about association rule mining and compared existing algorithms for association rule mining techniques. Of course, a single article cannot describe all the algorithms in detail...
A Semantic approach for segmentation of brain MR Images Using Adaptive CFM
MRI images play a vital role in clinical and research applications that requires segmentation as an important task .This requires classification of different intensity classes for pathological representations of biologic...
Decision Support System for Fault Localization in COTS Integration
The failure-detection and fault-correction are analytical procedurees in attaining high-quality achievement of software excellence. In this paper, we adduce a amount of improvements on the bourgeois software bendability...
Survey of Dimensionality Reduction and Mining Techniques on Scientific Data
Dimensionality reduction techniques on scientific data are currently a focused approach to understand the underlying scientific knowledge in a dataset resulted from scientific experiments and simulations. The sole purpos...