International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 147 | Views: 367

Research Paper | Information Technology | Iraq | Volume 6 Issue 7, July 2017 | Popularity: 6.7 / 10


     

Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules

Dr. Abdulkareeem Merhej Radhi


Abstract: Due to the rapid development of software's and algorithms that attack wireless connections, as well as risky challenges which encounter the data passing through this connection with the development of the potential capabilities of intruders, urgent manage risks of this wireless connections arises which it became necessary to analysis and protect this data. This paper propose a compromising way between protecting data from eavesdropping with intruding and risks. The paper introduces a new type of cryptographic algorithm that minimize these risks. The proposed rules that process these risks adopted on fuzzy theory. The target packets captured for local area network using WIRESSHARK free source software, then tested, and results discussed which concludes that minimizing risk for this network in diagnosed cases can be achieved via controlling transmitted data via the proposed encryption system. Matlab Guide toolbox 2013 and Laptop with Intel processor I5 with RAM 8GB was used.


Keywords: Risk, Cryptography, Fuzzy, Packets, WLAN


Edition: Volume 6 Issue 7, July 2017


Pages: 1006 - 1012



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Dr. Abdulkareeem Merhej Radhi, "Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules", International Journal of Science and Research (IJSR), Volume 6 Issue 7, July 2017, pp. 1006-1012, https://www.ijsr.net/getabstract.php?paperid=ART20175375, DOI: https://www.doi.org/10.21275/ART20175375



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024

Pages: 658 - 660

Systematic Selection of Antipsychotics in Schizophrenia: A Binary Search Approach Based on Efficacy and Side Effects

Kunal Dhanda, Sweta Sehrawat

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 13 Issue 1, January 2024

Pages: 661 - 664

Revolutionizing Public Health: A Blockchain - Based System for Secure Genetic and Medical Data Management

Kunal Dhanda, Sweta Sehrawat

Share this Article

Downloads: 0

Review Papers, Information Technology, United States of America, Volume 13 Issue 6, June 2024

Pages: 1741 - 1747

Risk Management and Compliance with Business Intelligence in Banking

Pranay Mungara

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2495 - 2503

Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms

Kishore Gade

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 11, November 2021

Pages: 1597 - 1607

Internal and External Audit Preparation for Risk and Controls

Guruprasad Nookala

Share this Article
Top