Visible to the public A Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues

TitleA Brief Review of Fuzzy Logic and Its Usage Towards Counter-Security Issues
Publication TypeConference Paper
Year of Publication2018
AuthorsPillutla, H., Arjunan, A.
Conference Name2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
Date PublishedMarch 2018
PublisherIEEE
ISBN Number978-1-5386-3624-4
Keywordsanomaly detection, Computer crime, computer resources, counter-security issues, denial of service, denial-of-service attack, distributed denial of service, distributed denial of service attacks, Fuzzy logic, Intrusion detection, intrusion detection system, Metrics, packet dropping attacks, pubcrawl, Receivers, resilience, Resiliency, security, security mechanisms, security of data, TCP SYN flooding attacks, Trust Management., trust model
Abstract

Nowadays, most of the world's population has become much dependent on computers for banking, healthcare, shopping, and telecommunication. Security has now become a basic norm for computers and its resources since it has become inherently insecure. Security issues like Denial of Service attacks, TCP SYN Flooding attacks, Packet Dropping attacks and Distributed Denial of Service attacks are some of the methods by which unauthorized users make the resource unavailable to authorized users. There are several security mechanisms like Intrusion Detection System, Anomaly detection and Trust model by which we can be able to identify and counter the abuse of computer resources by unauthorized users. This paper presents a survey of several security mechanisms which have been implemented using Fuzzy logic. Fuzzy logic is one of the rapidly developing technologies, which is used in a sophisticated control system. Fuzzy logic deals with the degree of truth rather than the Boolean logic, which carries the values of either true or false. So instead of providing only two values, we will be able to define intermediate values.

URLhttps://ieeexplore.ieee.org/document/8538555
DOI10.1109/WiSPNET.2018.8538555
Citation Keypillutla_brief_2018