USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS solution for their network. There is never one solution that works for everything so user has to compare the capabilities of each along with budget, knowledge and needs to find one that works best for them. This paper provides a user requirements weight based approach to IDS selection for WLAN. In this approach first all possible user WIDS requirements and WIDS metrics are listed, then for each WIDS requirement we find the concern metric(s). User lists their WIDS requirements in a partial ordering from least important to most. Requirements are usually stated in positive form or converted to the positive form. Next, the first requirement (i.e. least important) is assigned the lowest weight (e.g., one). Other requirements may be assigned increasing weights in proportion to their relative importance. Once the requirements are weighted, each WIDS metric is assigned a weight that is equal to the sum of the weights of the requirements it contributes to. WIDS metrics are arranged in descending order where metric with the highest weight is at the top. Appropriate WIDS tool may be selected after matching the metrics weight and WIDS features. In the end of the paper we discuss scope for the future work in this area.
Authors and Affiliations
Rupinder Singh , Dr. Jatinder Singh
Extending E-Democracy to Enhance Voter Registration and Identification: South Africa Elections Perspective
The increase in information and communication technologies (ICTs), especially the Internet has been useful and yielded positive impacts in today’s e-society. With e-democracy in particular, ICT can help build trust by en...
Survey Report on Software Cost Estimation using Use Case Point Method
Software estimation is an important activity in software project management. Many software projects fail because of the inaccurate and untimely estimation of cost. Estimation in the early stages of the software life cycl...
A System Framework for Player Selection
The performance of Indian sport person has been pathetic at International level. The performance in any sport or game is a combine effect of various parameters like the Body Posture and Body Type, Diet, Exercise, Trainin...
An effective cluster formation with security in mobile ad hoc network
Mobile ad hoc networks have attracted much attention due to their mobility and easy deployment. However, the wireless and dynamic nature of network renders them more vulnerable to various types of security attacks than t...
Using Queuing theory the performance measures of cloud with infinite servers
Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...