Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
G6947
In any information system intrusions are the activities that damage the security and integrity of the system. In this paper we focus on wireless network, intrusions in wireless network (WLAN) and different Distributed Intrusion Detection Systems which are used to detect these attacks or intrusions. The rapid enhancement in wireless network has changed the level of network security. So, past of protecting the network with the firewalls are not sufficient to maintain network security in wireless local area network. There are different intrusion detection techniques which are used for identifying the various types of intrusions in wireless local area network. In this paper, we compare the various Distributed intrusion detection Systems used for detecting attacks in wireless network and also make a comparison table of these DIDS depending upon the performance. This comparison table will very helpful in designing better intrusion detection systems for detecting and preventing of vulnerabilities in wireless network.
Article file ID not found.
Mr. Opinder Singh. 2012. \u201cComparative study of various Distributed Intrusion Detection Systems for WLAN\u201d. Global Journal of Research in Engineering - F: Electrical & Electronic GJRE-F Volume 12 (GJRE Volume 12 Issue F6): .
Crossref Journal DOI 10.17406/gjre
Print ISSN 0975-5861
e-ISSN 2249-4596
The methods for personal identification and authentication are no exception.
Total Score: 107
Country: India
Subject: Global Journal of Research in Engineering - F: Electrical & Electronic
Authors: Mr. Opinder Singh, Dr. Jatinder Singh (PhD/Dr. count: 1)
View Count (all-time): 209
Total Views (Real + Logic): 5485
Total Downloads (simulated): 2755
Publish Date: 2012 05, Wed
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
In any information system intrusions are the activities that damage the security and integrity of the system. In this paper we focus on wireless network, intrusions in wireless network (WLAN) and different Distributed Intrusion Detection Systems which are used to detect these attacks or intrusions. The rapid enhancement in wireless network has changed the level of network security. So, past of protecting the network with the firewalls are not sufficient to maintain network security in wireless local area network. There are different intrusion detection techniques which are used for identifying the various types of intrusions in wireless local area network. In this paper, we compare the various Distributed intrusion detection Systems used for detecting attacks in wireless network and also make a comparison table of these DIDS depending upon the performance. This comparison table will very helpful in designing better intrusion detection systems for detecting and preventing of vulnerabilities in wireless network.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.