USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS solution for their network. There is never one solution that works for everything so user has to compare the capabilities of each along with budget, knowledge and needs to find one that works best for them. This paper provides a user requirements weight based approach to IDS selection for WLAN. In this approach first all possible user WIDS requirements and WIDS metrics are listed, then for each WIDS requirement we find the concern metric(s). User lists their WIDS requirements in a partial ordering from least important to most. Requirements are usually stated in positive form or converted to the positive form. Next, the first requirement (i.e. least important) is assigned the lowest weight (e.g., one). Other requirements may be assigned increasing weights in proportion to their relative importance. Once the requirements are weighted, each WIDS metric is assigned a weight that is equal to the sum of the weights of the requirements it contributes to. WIDS metrics are arranged in descending order where metric with the highest weight is at the top. Appropriate WIDS tool may be selected after matching the metrics weight and WIDS features. In the end of the paper we discuss scope for the future work in this area.
Authors and Affiliations
Rupinder Singh , Dr. Jatinder Singh
Security against attacks in TOR networks
TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...
The Moderating Factors of 3G User Acceptance Technology in Shimla (India) Using UTAUT Model
The UTAUT model one of the best model that affect the behavior acceptance and also help us predicting the user acceptance technology. UTAUT model is current model that has used in predicting usage of mobiles, computer sy...
Animal Health Observation by Using Query Processing Based On Fuzzy Logic in Wireless Sensor Network
Wireless Sensor Networks (WSNs) query processing based on fuzzy logic provides specifications of the desired data of common natural language, eliminate the custom of threshold values the same as predicates. The query of...
Land use and Land Cover Classification using RGB&L Based Supervised Classification Algorithm
After the Geometric correction and resampling the image should be classified. This paper introduced a new method for classifying the areas in a remotely sensed image under the category of supervised classification techni...
Survey Report on Software Cost Estimation using Use Case Point Method
Software estimation is an important activity in software project management. Many software projects fail because of the inaccurate and untimely estimation of cost. Estimation in the early stages of the software life cycl...