Raya Basil Alothman
University of Mosul

Published : 1 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Malicious attacks modelling: a prevention approach for ad hoc network security Hasanien Ali Talib; Raya Basil Alothman; Mazin S. Mohammed
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 3: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i3.pp1856-1865

Abstract

As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artificial intelligence attack predictors and virtual private networks have been implemented with the purpose of preventing harmful activity within such connections. Using a wide variety of machine learning methods like Random Forests and Nave Bays, malicious assaults of any kind can be identified and thwarted in their tracks. Another technique for anticipating attacks is the use of an artificial neural network, which is a type of system that engages in deep learning and learns the behaviors of attacks while it is being trained so that it can then predict attacks. The results of this study demonstrate that the use of machine learning and artificial intelligence techniques can significantly improve the security and performance of virtual private networks and can effectively identify and prevent malicious attacks on networks.