USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS solution for their network. There is never one solution that works for everything so user has to compare the capabilities of each along with budget, knowledge and needs to find one that works best for them. This paper provides a user requirements weight based approach to IDS selection for WLAN. In this approach first all possible user WIDS requirements and WIDS metrics are listed, then for each WIDS requirement we find the concern metric(s). User lists their WIDS requirements in a partial ordering from least important to most. Requirements are usually stated in positive form or converted to the positive form. Next, the first requirement (i.e. least important) is assigned the lowest weight (e.g., one). Other requirements may be assigned increasing weights in proportion to their relative importance. Once the requirements are weighted, each WIDS metric is assigned a weight that is equal to the sum of the weights of the requirements it contributes to. WIDS metrics are arranged in descending order where metric with the highest weight is at the top. Appropriate WIDS tool may be selected after matching the metrics weight and WIDS features. In the end of the paper we discuss scope for the future work in this area.
Authors and Affiliations
Rupinder Singh , Dr. Jatinder Singh
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center
The main aspect of any cloud application is to provide simultaneous access to number of users by reducing the cost of maintenance. This is mainly achieved by the process of implementing virtualization effectively. Virtua...
Discrete & Continuous Mouse Motion Using Vocal & Non Vocal Characteristics of Human Voice.
Mouse control today has become an important tool to interact with computers. It is quite easy for those who are physically fit and mentally sound, but for those who are suffering from physical disabilities, It is quite d...
A Survey on Underwater Sensor Network Architecture and Protocols
Underwater sensor networks (UWSNs) are becoming popular everyday due to their ability which makes them to be deployed under adverse environmental conditions. UWNs are the enabling technology for wide range of application...
Improving the Network Lifetime of MANETs through CSP routing Algorithm
Cooperative Communication is a technique that allows multiple node to transmit the same data. In this paper propose a Cooperative Shortest Path (CSP) Routing Algorithm for Mobile ad hoc Network (MANETs).Cooperative Short...
ENCHANCED WARNING MESSAGE DISSEMINATION IN VANET
Vehicular ad hoc networks uses vehicles as nodes, it turns every participating car into a router and create a network with a wide range. In recent years, new applications, architectures and technologies have been propose...