Abstract of Intrusion Detection , IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015


Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari | Swati G. Kale


Abstract: Computer Networks now a days are becoming a basic needs of this era where information sharing is key element for growth. With such use, the level of mischievousness has also grown briskly. Intrusion Detection Systems (IDS) are deployed to annotate such elements of the network so that the normal operation of the network is continued. IDS analyses the network and uncovers the malicious activities from member of the network of from the outside network. The strategies normally deployed in the implementation of as IDS evaluate the network based on knowledge of the expert system. The decision making methodology in existing IDS are found to be accommodating very limited number of conditions. Our proposed system will be deploying Fuzzy Logic rules of Artificial Intelligence to take decisions on malicious activities in the network. Such a scheme aims to include maximum possible conditions as they occur in the network. This system will considered the algorithm of the information security management system based on soft computing, and will implement a prototype of the intrusion detection system (IDS) for a network


Keywords: Networksecurity, intrusion detection system, anomaly detection, Fuzzy Logic, acknowledgment ACK


Edition: Volume 4 Issue 4, April 2015,


Pages: 1576 - 1580


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Ketaki P. Bhusari, Swati G. Kale, "Intrusion Detection in Wireless Network Using Fuzzy Rules", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 1576-1580, https://www.ijsr.net/get_abstract.php?paper_id=SUB153322

Similar Articles with Keyword 'intrusion detection system'

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2487 - 2494

Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices

Jeevan Manda [4]

Share this Article

Downloads: 7 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Student Project, Information Technology, India, Volume 10 Issue 12, December 2021

Pages: 695 - 698

Intrusion Detection using Machine Learning Techniques

Akshay Kaushik | Varun Goel

Share this Article
Top