Fuzzy Approach for 802.11 Wireless Intrusion Detection

Raouf Ketata*, 0**
*,** Researoh unit on Intelligent Control, Design and Optimization of Complex Systems (/COS), National Sohool of Engineers of Sfax. National Institute of Applied Soienoe andTeohnolog!es ofTunis, Tunlsia
Periodicity:October - December'2007
DOI : https://doi.org/10.26634/jse.2.2.567

Abstract

This paper proposes a new fuzzy logic approach to perform analysis and detection intrusion in 802.11 wireless networks. The algorithm consists on five steps: First, construct our networks and generating much case of daily traffic and intrusion. In same time, catch different values of system and networks parameters and associate with them a potential degree of severity alarm. Second, generate fuzzy rules from numerical data using Mendel Wang method. Third, implement new rule base on each computer and start system. Adjust it for catching parameter cyclically and compute severity alarm. If it detects intrusion, then send massage for every network node. Four, in case of no responding system or error, start learning mechanism by injection of numerical values and generating fuzzy rules.

Keywords

Fuzzy Logic, Network Security, Wireless Intrusion Detection

How to Cite this Article?

Raouf Ketata and Hatem Bellaaj (2007). Fuzzy Approach for 802.11 Wireless Intrusion Detection. i-manager’s Journal on Software Engineering, 2(2), 49-55. https://doi.org/10.26634/jse.2.2.567

References

[I]. D. Dosgupto & oI., MMDS: Multilevel Monitoring and Detection System proceedings of the l5th Annual Computer Securlty Incident Handling Conference (FIRST}, Ottawa, Canada June 22-27, 2003
[2]. H. N. V. Hovingo & oI. , Fuzzy Logic - DELFT UNIVERSITY TECHNOLOGY OF, I 999 ,
[3]. L.-X. Wong & oI., Generating fuzzy rules by learning from examples /EEE Trans. Syst., Man, Cybern. , vol, 22, pp. I 4141427, Nov./Dec, 1992,
[4]. M. Gast, 802,11 Wireless Networks: The Definitive Guide Creating and Administering Wireless Networks, Oreilly Edition April 2002
[5]. M. Gast, Seven Security Problems of 802~11 Wireless. Ore///y Edition 2002
[6]. N. Ramos, & al., Quality of Service Provisioning in 802.Ile Networks: Challenges, Approaches, and Future Directions - /EEE Ne/work JuIy/August 2005 University of California at San Diego
[7]. T. Karygiannis, & al., Wireless Network Security 802.11, Bluetooth and Handhold Devices, Computer Security Division Information Technology Laboratory National institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002
[8]. Z. Tabona, An Introduction to Wireless Networking Windowsnetworking,comMay2OO5~
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.