Simulation and Auditing of Network Security Based on Probabilistic Neural Network Approach

  • Dr. A. Jacob Computers and Information Technlolgy department, Macquarie University, Australia
  • Prof. h. Lucas Computers and Information Technlolgy department, Macquarie University, Australia

Abstract

Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved for identifying the particular attack like as wormholes, black holes and selfish.

References

[1] Kong Hong-shan, Zhang Ming-qing, Tang Jun, Luo Chang-yuan “The research of simulation for network security based on system synamics”,ICIAS,2009.
[2] Handan, Hebei Province,”Investigation of PCFA in assessing main function indexes of intrusion detection system in network security”,ISIEEC,2009.
[3] Li Cong-cong1,Guo Ai-ling2,Li Dan3 “Application Research of Support Vector Machine in network Security risk evaluation”,2007.
[4] D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high-throughput path metic for multi-hop wireless routing,” in
Proc. ACM MobiCom‟03, San Diego, CA, Sept. 2003.
[5] M. Zorzi and R. R. Rao, “Geographic random forwarding (geraf) for ad hoc and sensor networks energy and latency
performance,” IEEE Trans. Mobile Computing, vol. 2, no. 4, 2005.
[6] S. Biswas and R. Morris, “Exor: opportunistic multi hop routing for wireless networks,” in Proc. SIGCOMM‟05,
Philadelphia, PA, Aug. 2005.
[7] P. Garcı´a-Teodoroa, J.Dı´az-Verdejo, G. Macia´- Ferna´ndeza, E. Va´zquezb “Anomaly-based network intrusion detection Techniques, systems and challenges ”
published on computers & security 28 ( 2009) 18 – 28
[8] H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, “Least-cost opportunistic routing,” School of Computer and
Communication Sciences, EPFL, Technical Report LCAV-REPORT-2007-001, 2007.
[9] K. Zeng, W. Lou, J. Yang, and D. R. Brown, “On throughput efficiency of geographic opportunistic routing in
multihop wireless networks,” in Proc. QShine‟07, Vancouver, British Columbia, Canada, Aug. 2007.
[10] K. Zeng, W. Lou, and Y. Zhang, “Multi-rate geographic opportunistic routing in wireless ad hoc networks,” in Proc.
IEEE Milcom, Orlando, FL, Oct. 2007.
[11] K. Zeng, W. Lou, J. Yang, and D. R. Brown, “On geographic collaborative forwarding in wireless ad hoc and
sensor networks, ” in Proc. WASA‟07, Chicago, IL, Aug. 2007.
[12] B. Awerbuch, D. Holmer, and H. Rubens, “The medium time metric: High throughput route selection in multi-rate ad
hoc wireless networks,” MONET, vol. 11, no. 2, pp. 253–266, 2006.
Published
2017-12-27
How to Cite
JACOB, Dr. A.; LUCAS, Prof. h.. Simulation and Auditing of Network Security Based on Probabilistic Neural Network Approach. Universal Journal of Computers & Technology, [S.l.], v. 2, n. 2, p. 196-199, dec. 2017. ISSN 2456-2955. Available at: <http://uproonline.com/index.php/UJCT/article/view/64>. Date accessed: 17 aug. 2018.
Section
Articles

Keywords

Mobile adhoc network, Adhoc On Demand Distance Vector Routing, probabilistic Neural Network Analysis, attacks