A Study of Intrusion Detection System using Advanced Genetic Algorithm
Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0
Abstract
As of today, we are relying more and more on Internet or network computer access, a growing problem intrusion into computer systems by unauthorized users has been observed. An intrusion is unauthorized access or attempted access into or unauthorized activity in a computer or information system. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. Intrusion detection is the process of identifying that an intrusion has been attempted, is occurring or has occurred. In this paper, we are focusing on Intrusion Detection System based on genetic algorithm (GA).
Authors and Affiliations
Aman V. Mankar, Tushar C. Ravekar
An Epidemic Surveillance System for Digital India
The paper presents a conceptual model for creating an epidemic surveillance system. The System will help in predicting the outbreak of epidemics and diseases. A working model can be created by implementing the terminolog...
Estimating Brain Vigor in Discussion from Behavioral Reaction for Stressful Load
To create new idea, young persons often have one-to-one discussion with their mentors.In such meeting,heavy stressful loads are often imposed on young persons. We should improve the quality of discussion in progress so t...
Survey Paper: M-Learning A new form for Distance Learning
Mobile learning is not the conjunction of mobile and learning it has always implicitly meant mobile electronic learning and its development have to be understood as both a continuation of conventional electronic-learning...
Selection of EAP Authentication Method for use in a Public WLAN: Implementation Environment Based Approach
This paper presents IEEE 802.11 implementation specific issues that may contribute to poor WLAN authentication and access control security performance in a public WLAN. It will also analyse five EAP methods and present a...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CVSS Based Approach
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).