{"title":"New approach of authentication method based on profiles","authors":"R. Naidu, K. Meghana, P. S. Avadhani, I. Rao","doi":"10.1109/RAIT.2016.7507929","DOIUrl":null,"url":null,"abstract":"The exponential raise in traffic across network has obliged the need to distinguish unauthorized access. The process of identifying an individual usually based on a user name and password, which is the process of giving individuals access to system objects based on their identity. Authentication can involve highly complex and secure methods. This paper proposes an innovative algorithm based on neural networks and fuzzy logic that can be used for easy identification of unauthorized users in a network. The algorithm has been tested and validated and the results have been discussed. The result analysis shows that the algorithm is successful in intrusion detection.","PeriodicalId":289216,"journal":{"name":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 3rd International Conference on Recent Advances in Information Technology (RAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAIT.2016.7507929","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The exponential raise in traffic across network has obliged the need to distinguish unauthorized access. The process of identifying an individual usually based on a user name and password, which is the process of giving individuals access to system objects based on their identity. Authentication can involve highly complex and secure methods. This paper proposes an innovative algorithm based on neural networks and fuzzy logic that can be used for easy identification of unauthorized users in a network. The algorithm has been tested and validated and the results have been discussed. The result analysis shows that the algorithm is successful in intrusion detection.