Risk Surveillance Control of Wireless Security Attack with Fuzzy Rules
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 7)Publication Date: 2017-07-05
Authors : Abdulkareeem Merhej Radhi;
Page : 1006-1012
Keywords : Risk; Cryptography; Fuzzy; Packets; WLAN;
Abstract
Due to the rapid development of software's and algorithms that attack wireless connections, as well as risky challenges which encounter the data passing through this connection with the development of the potential capabilities of intruders, urgent manage risks of this wireless connections arises which it became necessary to analysis and protect this data. This paper propose a compromising way between protecting data from eavesdropping with intruding and risks. The paper introduces a new type of cryptographic algorithm that minimize these risks. The proposed rules that process these risks adopted on fuzzy theory. The target packets captured for local area network using WIRESSHARK free source software, then tested, and results discussed which concludes that minimizing risk for this network in diagnosed cases can be achieved via controlling transmitted data via the proposed encryption system. Matlab Guide toolbox 2013 and Laptop with Intel processor I5 with RAM 8GB was used.
Other Latest Articles
- Evaluation of Closed and Open Reduction of Condylar Fractures
- Shelf Space Allocation Problem Using LNS Solver
- New Hope to Urbanism: Congruence of Architectural Conservation, Urban Design and Sustainability
- The Cognitive Model of Consciousness in Toto
- Clinical Study of Pregnancy with Congenital Heart Disease in a Tertiary Care Centre
Last modified: 2021-06-30 19:29:57