作者
Harikrishna Pillutla, Amuthan Arjunan
发表日期
2018/3/22
来源
2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
页码范围
1-6
出版商
IEEE
简介
Nowadays, most of the world's population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated …
引用总数
201920202021202211
学术搜索中的文章
H Pillutla, A Arjunan - … on Wireless Communications, Signal Processing and …, 2018