# A Novel Approach to Detect Malicious User Node by Cognition in Heterogeneous Wireless Networks Introduction ow a day's Provisioning of security in networks has become challenge to researchers. The mechanisms currently employed are lack of adaptability to the unknown dynamic network conditions. The layered architecture adopted by the current network deployments lacking intelligent communication, lead to reduced network performance and unaware circumstances that arise at each level of the network architecture lead to reduced network performance. The amendments in the layered architecture are carried out post occurrences of problems or malicious activities. The need for secure intelligent and adaptable mechanisms is mandatory. Such mechanisms can be realized based on cognition loop or the OODA loop [1] [2]. Where the network conditions are observed, orientations and adoptions are achieved by intelligence, decisive actions are formulated and these decisions are applied to the network at the acting stage of the OODA loop. Such intelligent and adaptable networks are known as "Cognitive Networks" [3]. The cognitive network approach to secure networks from malicious user nodes or malicious activity is comparatively new and unique. Machine leaning techniques like fuzzy logic, self-organizing maps, neural networks can be used to incorporate intelligence into cognitive systems [4]. In this paper we introduce a discrete time dynamic neural network methodology to incorporate intelligence [5] [6]. Adoption of Cognition is based on the network metrics, parameters and patterns [7]. The cognitive network facilitates output in the form of certain actions that can be implemented for modifying the reconfigurable network policies, network components or network elements. # i. Cognitive radio (CR) The Cognitive radio [1] (CR) is defined as "a radio that is aware of its environment or surroundings and adapts it intelligently". The cognition itself is an elusive quality which appears to be cognitive or intelligent prior to implementation is often dismissed as merely "adaptive" afterwards. A number of factors motivate CRs. CR is a transceiver system that is solely designed for using the best available wireless channel or resource in vicinity. Such kind of radio automatically detects the available bandwidth or spectrum resources and then it changes its transmission or reception parameters for permitting more synchronized wireless communication in a provided spectrum band even at the same location. The need for cognition is driven by the complexity of the radio systems themselves. The existence of software defined radio (SDRs) capable of implementing a near endless number of different waveforms with different modulation schemes, power levels, error control codes, carrier frequencies, etc., means that controlling the radio becomes a problem of combinatorial optimization. Such problems are often computationally hard and lend themselves to solutions based on meta heuristic optimization methods based on simple search guided by higher level strategy. The application of such meta heuristic, which often appear to learn and innovate in turn, characteristic of work in artificial intelligence. # ii. Cognitive Networks In order to achieve the seamless adaptation of radio link parameters, opportunistic use of underutilized spectrum, to get the higher flexibility in modulation and waveform Selection, the scientific or research society has seen an extraordinary progress in system or network development by implementing cognitive techniques. Cognitive Network is the best solution to attain the above mentioned requirements. Cognitive Network [3] can be defined as an intelligent network encompassing the cognitive process which can perform a goal of achieving current network circumstances, planning, taking certain decision, acting on those perceived conditions, extracting or learning from the consequences of its previous or current actions, all while following end-to-end goals. The important component of cognitive network is its Cognition Loop that senses the circumstances, plans the actions to be taken and even according to input from sensors and network policies. It decides which solution or decision might be most effective for achieving end-to-end purpose. These characteristics facilitates the network systems to learn from the past about the situations, plans, decisions, actions and then using experiences for improving the decision in future. # b) Objectives In this paper, we have considered the use of cognition engines to identify the malicious users that are present within a heterogeneous network offering services. Malicious activity inducted through network transactions can be identified by monitoring the service request rates of the user's nodes [8] [9] [10]. In order to analyze effectively, instantaneously and to adapt the diverse network service rates, we introduce the discrete time dynamic neural network cognition engine. Access control mechanisms are critical in provisioning of network security. The proposed cognition mechanism considers the Physical Architecture Description Layer (PADL) structure for access control [11]. # c) Organization This paper organization is as follows. Section two explains about literature survey. The background is discussed in the section three. The proposed system model is explained in section four. The Performance Evaluation and conclusions are discussed in the subsequent sections. # II. Literature Survey R.W. Thomas et al [3] provides the definition and introduction of "Cognitive Networks". In this research work, Software Adaptable Networks is considered to achieve cognition in networks. This paper also discusses a case study to demonstrate the concepts of cognitive networks based on the OODA Loop. The case study is targeted to maximize the time taken to connect between a source node and one or more destination nodes. The case study considers both multicast and unicast communication models. A network of learning automata is considered for the realization of the cognition layer. Finite Action Learning Automata is used to achieve cognition and the case study is compared with a non-cognition model Directional Reception Incremental Protocol [12]. The Finite Action Learning Automata achieves a 11% performance improvement in solution finding. The major drawback of the algorithm proposed in this paper is that it is not applicable for link failures which occur in the real world scenario. R S Komali et al [7] discuss about the effects of local and global information acquisition in cognitive networks. In this paper the cost of acquiring information, processing and network overheads arising from information accumulation is clearly discussed. The authors propose a Local ?? Improvement Algorithm and compare it with the ?? Improvement Algorithm [13] [14] and prove its efficiency. The authors of this paper conclude that utilizing both global and local information to achieve cognition, degrades system performance and an optimum global and local knowledge can be utilize to achieve cognition without effecting network performance. The major drawback is that there is no clear conclusion drawn as to the information global or local ratio to be considered to achieve cognition. Daojing He et al [8] have proposed a trust based node misbehavior detection scheme for medical sensor networks. The trust is computed based on the rate of transmission and leaving time of the medical sensor nodes. Based on the trust computation malicious nodes are identified. The model is compared with ?????? [15] trust model.Performance improvement in terms of packet delivery and malicious node detection is proved using simulation and experimental test beds. The drawback of the system is that it is applicable to centralized systems supporting only unicast transmissions. Tao Jun et al [9] developed an intrusion detection algorithm based on user behavior. Utilizing the statistics variance method based on the user nodes behavior in transmission rates the intrusions are detected. The paper also discusses the preventive measures incorporated in the case of Address Resolution Protocol [16] attacks. The algorithm proposed in this paper achieves a detection rate of about 0.9975 when compared to the system described in [17] which achieves a detection rate of about 0.9929. The authors have evaluated the proposed algorithm on the KDDCUP 1999 datasets [18] which has limited network user node features and is inconclusive. S C Lingareddy et al [11] presented a paper that describes a mechanism for securing of wireless networks by the cognitive neural network approaches where the participating users are uniquely identified by implementing their respective Physical Architecture Description Layer (PADL) attributes. In this work they employ the certain data from Physical Layer and the Radio Layer in order to create the Physical Architecture Year 2014 E Description Layer (PADL), which is used to authenticate the system that tries to access the wireless network. Here the cognitive security manager (CSM) maintains the integrity of the entire network by analyzing the Physical Architecture Description Layer (PADL) of all the nodes within the network. Zhang Wenzhu and Yi Bohai [19] have introduced a multi domain cognition system. The authors have proposed two cognition models namely a Local Single-Domain Cognitive approach and a Local Multi-Domain Cognition approach. A multidimensional edge detection theory [20] is adopted to achieve cognition in the Local Single-Domain Cognitive approach and similar concepts have been extended to achieve cognition in the Local Multi-Domain Cognition approach. Multi domain systems considered in this paper is defined in [21]. The concept of Local Multi-Domain Cognition approach is still very naive and can be further improved upon. G Sunilkumar et al [22] presented a research work that not only Monitors activity of user node but also performs an effective function of taking preventive measures if user node transactions are found to be malicious. In this research work the intelligence in cognitive engine has been realized using self-organizing maps (CSOMs). In order to realize the CSOMs Gaussian and Mexican Hat neighbor learning functions have been evaluated. The research simulation made in this work proves the efficiency of Gaussian Learning function that is found to be better for cognition engine. The cognition engine being considered in this research work is evaluated for malicious node detection in dynamic networks. In this work the implemented concept results in higher Intrusion detection rate as compared to other similar approaches. # III. # Background The authors in [11] have proposed a secure Cognitive Framework Architecture for 802.11 networks based on the OODA Loop. The core of the architecture i.e. the Cognitive Security Manager incorporates the cognition process using robust access control mechanisms based on the PADL. The authors of this paper adopt a similar access control mechanism to identify the nodes within the network. Intelligence to achieve cognition is realized using a multilayer feed forward neural network trained based on the back propagation algorithm. User behavior monitored and analyzed to achieve the Cognition Process. Access control mechanisms coupled with cognition processes is introduced. The use of Multilayer Feed Forward neural networks cannot effectively handle the network dynamics in heterogeneous environments and exhibits reduced malicious node detection. To achieve better malicious node detection rates the proposed model considers the use of discrete time dynamic neural networks to achieve cognition. # IV. # Proposed System Model a) Cognitive Network Modelling Let's consider a network on which cognition is to be realized represented as ?? ?? ?? . The cognitive network can be represented as a graph defined as ?? ?? ?? = (?? ?? ?? , ?? ?? ?? )(1) Where ?? ?? ?? represents the set of network connections or links that exists between the network elements represented by ?? ?? ?? . The cognitive network element set consists of a set of cognitive servers represented as ?? ?? ?? , router elements set represented as ?? ?? ?? and client nodes set represented as ?? ?? ?? . The network clients set constitute of wireless and wired type to realize a heterogeneous network. The network elements set can thus be defined as ?? ?? ?? = {?? ?? ?? ? ?? ?? ?? ? ?? ?? ?? } 2) All the links that constitute towards the link set ?? ?? ?? are assumed to be bi-directional in nature and can of wired or wireless nature. A sample network graph is as shown in Figure 1. The router set ?? ?? ?? are assumed to be secure and are trusted network elements. The client nodes or the leafs of the network graph shown above and are assumed to constitute of trusted or normal users set represented as ?? ?? ?? and malicious or untrusted users set represented as ?? ?? ?? . Hence the client node set can be defined as The objective of the cognitive network discussed here is to identify the number of malicious users ?? ?? ?? in the cognitive network ?? ?? ?? . The cognitive server is assumed to host a set of services ?? for the users to access.In the cognitive network model the routers set only forward the data received from the client nodes to the cognitive servers. Cognition is achieved by incorporation the Cognition Loop also known as the OODA Loop. The cognition process is carried out on the cognitive servers which intercommunicate to facilitate higher malicious user detection rates. A packet level communication model is considered in this system wherein the user nodes request for services using a packet based transmission system. The PADL based user identification approach is adopted for accurate identification of user nodes. User node behavior is observed based on the transmitted data and the transmission rate. Transmission rate is defined as . Malicious users in the ideal scenario try to compromise or attain control of a greater number of service hosts in order to perform untrusted activities. Such untrustworthy behavior is modeled by inducing additional service request packets and which can be observed by the incremental transmission rate. Identification of malicious users where in there is no increased injection of service packets is also considered. ?? ?? ?? = {?? ?? ?? ? ?? ?? ?? }(3?? ???? ?? ?? = ?? ???? ?? ?? ??(4) User node activity in the cognitive network ?? ?? ?? is observed by monitoring the service packet request rate measured in terms of the transmission rates of the service packets. Let the service transmission rate of a client node ?? be represented as ?? ???? ?? ?? i.e. the observed service request rate of the cognitive server ?? ?? ?? is also ? ?? ???? ?? ?? assuming lower network losses. The cognitive process adopted relies on dynamic neural network based intelligence for analysis of the service request packets. A discrete time dynamic neural network is adopted for orientation of the cognitive process incorporated. The decision phase of the cognition cycle relies on the service request packet analysis results obtained from the output of the dynamic neural networks. The action or the control strategies phase of the cognition cycle is achieved based on the decisions and is implemented on the cognitive servers ?? ?? ?? . The algorithm adopted to implement the action is discussed in the latter section of this paper. The cognition cycle is represented in Figure 2. Where the sampling period is represented by ?? and ?? Represents the instance of sampling and ??(??) is the input service requests to be observed by the cognitive server ?? ?? ?? at the ?? ??? time instance. The client node behavior to be observed can also be defined as # Global Journal of Computer Science and Technology ??? ??? = ??(?? + 1) ? ??(??)(6) When ?? = 1 The discrete time dynamic neural network unit can be graphically represented as shown in Figure 3 given below. The output of the dynamic neural networks is the learning or the cognitive observations represented as ?? ?? ?? (??) is defined as ?? ?? ?? (??) = ?? × ???(??)?(8) Considering a set of service packets transmitted from the user nodes in the topology represented as?? ?? (??). Where ?? = 1,2,3,4, ? ? ??. The learning algorithm of the dynamic neural network can be defined as ??(?? + 1) = ???? ???? ?? ? + ??(??(??), ð?"?ð?"? ) ? ?(?? ? 1)???(??)???(9) Where, ??(??(??), ð?"?ð?"? ) = ? ?? ?? ??(?? ?? ?? + ?? ?? ) = ?? ?? ??(???? + ??) ?? ??=1(10) The learning error of the neural network model is defined as ??(??) = 1 2 (?? ?? (??) ? ??(??)) 2 + 1 2 ? [?? ?? (??) ? ??(??)] 2 ???1 ??=0(11) Considering ??(??) = ?? ?? (??) ? ??(??) and ??(??) = ?? ?? (??) ? ??(??) The learning error can be defined as ??(??) = 1 2 ?? 2 (??) + 1 2 ? ?? 2 (??) ???1 ??=0(12) Based on the parameters ?? the partial derivatives of the error index is defined as ???? ???? = ?(? ??(?? + 1)??(??) ???1 ??=0 )(13) Where ??(?? + 1)is the Lagrange multiplier. Based on the weight parameter ð?"?ð?"? the partial derivatives of the error index is defined as ???? ??ð?"?ð?"? = ? ??(?? + 1)?? ð?"?ð?"? (??(??), ð?"?ð?"? ) ???1 ??=0(14) Where ??(?? + 1)is the Lagrange multiplier. The dynamic neural networks increments the parameters ?? and the weight ð?"?ð?"? to minimize the learning error. The rate at which ?? is incremented represented as ???(??) is defined as ???(??) = ? ??? ?? ???? ???? ? (15)???(??) = ?? ?? ? ??(?? + 1)??(??) ???1 ??=0(16) The weight update rate is represented as ?ð?"?ð?"?(??) is defined as ?ð?"?ð?"?(??) = ? ??? ð?"?ð?"? ???? ??ð?"?ð?"? ?(17) ?ð?"?ð?"?(??) = ??? ð?"?ð?"? ? ??(?? + 1)?? ð?"?ð?"? (??(??), ð?"?ð?"? ) ???1 ??=0(18) The dynamic neural networks update the parameters?? and ð?"?ð?"? of the forward layers based on the following definitions ??(?? + 1) = ??(??) + ?? ?? ? ??(?? + 1)??(??) ???1 ??=0(19) ð?"?ð?"?(?? + 1) = ð?"?ð?"?(??) + ?? ð?"?ð?"? ? ??(?? + 1)ð??"ð??" ð?"?ð?"? (??(??), ð?"?ð?"?) ???1 ??=0(20) The back propagation learning for the discrete time dynamic neural network model enables to observe the service packet transmission rates of the cognitive server ?? ?? ?? by adopting a multi iterative process. The observations of the neural network are utilized for decision making and action planning at the cognitive servers ?? ?? ?? . # Cognitive Decision Making and Action Planning In this section we propose an action control adopted to limit the service request rates to the cognitive server ?? ?? ?? . Let ?? ?????? represent a fraction of the service request packet set from the users to the server through the routers i.e. 0 ? ?? ?????? ? 1 . By dropping or limiting the service requests received from the ?? ?? ?? cognition could be achieved. Let the packet dropping factor which is multiplicative in nature be represented as ?? . The packet dropping factor is adapted based on the presence of malicious users identified in the network topology. Let us define a constant ?? that is additive in nature and is introduced to increase the acceptance of service request packets when the number of normal users are greater i.e. ?? ?? ?? > ?? ?? ?? . The action control strategy is realized by the cognitive server set ?? ?? ?? and is executed when the service requests rates observed exceed the limit of the maximum transmission limit ?? ?? ?????????? ?? or when the current service request limit drops beyond the minimum supported transmission bandwidth ?? ?? ?????????? ?? . The service requests received by the server are monitored every ?? second. Here ?? is the monitoring time interval is considered to smaller than the round trip time between the server ?? ?? ?? and the user nodes ?? ?? ?? . The action control mechanism is not just as it tends to drop or limit the user service request immaterial of the kind of user ?? ?? ?? Where ?? ?? ? (??)is the traffic rate through each deployment router ?? ?? ?? (?) Based on the total traffic observed and the discrete time dynamic neural network analysis the ?? ?? ?? orients itself and the orientation results is defined as ?? ?? ?? = ?? ?? ?? ?? ? (??) ?? ?? ?? ??=1 ?(23) The ?? ?? ?? is utilized for decision making and the action strategies signal ?? ?????? ?? (??) is derived for all the routers in ?? ?? ?? (?) in the heterogeneous network environment. Based on the position and the link type the action signal is received at varied time instances due to inherit network delays. Let ?? ?? ? 0 represent the network delay from the ?? ?? ?? to the routers ?? ?? ?? . The action signal ?? ?????? ?? (??), the controlled traffic rate ?? ???? ?? ?? (??) and the traffic rates ?? ?? ? (??) change with respect to the time ?? and be considered as a coupled system. Coupled Differential equations can be used to represent such models. The cognitive server needs to maintain the traffic rate within the limits established by At a time instance ?? 0 , the cognitive server ?? ?? ?? observes the received traffic is greater than ?? ?? ?????????? ?? it is said to be over-loaded. The request rate observed is defined as ?? ???? ?? ?? (??) = ? 1 ?? ? ?? 2 (27) Where ?? ? ?? 0 ? 1 = ?? (1 2)?? 0 ? ?? ???? ?? ?? (?? 0 ) is a constant ?? ???? ?? ?? (?? 0 )Is the request rate at time instance ?? 0 Then the rate at which the over-loaded cognitive server receives request rates id defined as it is said to be under-loaded. The request rate observed is defined as ?? ?? ? (??) ? ?? ??? ??? ?? 0 ?? ?? ? (?? 0 ) ? 2?? ? ?? ?? ?? (??) ?? ?? 2 ?? ?? 2 (??)?? ?? 0 + 2?? ? ?? ?? ?? (??) ?? ?? 2 ?? ?? 2 (??)?? ?? ?(?? ???? ?? ?? (??) = ???? + ? 2(29) Where ?? ? ?? 0 ? 2 = ????? 0 is a constant Then the rate at which the under-loaded cognitive server receives request rates id defined as The cognition is achieved based on the OODA loop. The service requests received from the malicious users ?? ?? ?? are limited and dropped to achieve cognition and maintain the heterogeneous network integrity. The cognition process discussed derives its learning intelligence by using the discrete time dynamic neural networks trained using the back propagation algorithm. The experimental study conducted to prove the discussed cognition process is explained in the next section. V. # Performance Evaluation This section of the paper discusses the experimental study conducted to evaluate the cognition process based on the OODA Loop. The experimental environment for the heterogeneous environment ?? ?? test bed was developed using C# on the Visual Studio Platform. The heterogeneous environment constitutes of cognitive servers ?? ?? routers ?? ?? and client nodes ?? ?? . Cognitive decision making is incorporated within the cognitive servers. We have evaluated the proposed discrete time dynamic neural network cognitive engine (DNN-DT) against the MFNN cognitive engine. The ?? ?? considered of wired and wireless type. We have considered two mobility models namely, Random Directional Mobility and Random Waypoint Mobility for the user nodes ?? ?? . The user nodes ?? ?? ?? introduce regular service rates over the simulation test bed within the limits set by ?? ?? ?????????? ?? and ?? ?? ?????????? ?? and request the cognitive servers for a set of services through the routers deployed. A packet level structure is adopted to model such transactions. A random number of nodes i.e. malicious nodes ?? ?? ?? are introduced intro the network whose transactional service rates are irregular by nature i.e. ?? ???? ?? ?? > ?? ???? ?? ?? . The aim of the experimental study can be defined as identifying malicious transactions due to which irregular service rates are observed and negate the malicious client nodes ?? ?? ?? introducing such service rates by denying them service provisioning. The ability of the simulation environment is to handle variations in the number of ?? ?? , ?? ?? , ?? ?? along with the mobility options and channel noise considerations led to an extensive experimental scenarios summarized in Table 1. A total of twenty four scenarios are presented in this paper. The error in identifying the malicious nodes identified by the vibrational service rates is represented in It is that the DNN-DT cognitive engine reduces the malicious node detection error by about 25% when compared to the MFNN cognitive engine. The discrete time dynamic networks adapt quickly to the dynamic environments presented here. This ability of the discrete time dynamic neural network results in reduced network overheads in action planning and decision making phase of the OODA Loop. The network overheads observed are shown in Figure 6 and Figure 7 given below. The network overheads are measured in terms of the additional query transactions induced by the cognitive servers for accurate decision making. It was observed that about 12064, 19686 and 28865 transactional packets were reduced when considering the discrete time dynamic neural network to achieve cognition for the 3, 5 and 7 server scenarios. From Figure 7 it can be observed that the average reduction of about 2% was achieved considering an average of all the network transactions considered for the varied scenarios discussed in this section. Though the reduction in the average network overhead appears marginal, its significance increases for larger network scenarios. detection accuracy for ?? ?? 7 is shown in Figure 10. From the figure it is clear that the channel noise inclusion reduces the malicious node detection accuracy. The DNN-DT cognitive engine achieves an average detection accuracy of about 96.02% when compared to 84.45% detection accuracy achieved by the MFNN Cognitive engine. The accuracy of malicious node detection for random directional mobility is observed to be less than that of the random waypoint mobility model by about 0.297% and 0.375% for MFNN cognitive engine and DNN-DT cognitive engine. Mobility inclusion in network simulations induces an additional overhead in the network maintenance transactions. The effects of mobility on the network transactions are shown in Figure 11. The random waypoint mobility model was found to induce additional transactional overheads owing to the random node mobility it exhibits. The random directional mobility model considers the mobility of all the nodes as per a particular mobility rate and are less complicated when compared to random waypoint mobility models where in the mobility of random nodes is induced. The receiver operating characteristics curve for ?? ?? 7 discussed here is shown in Figure 12. The area covered by the DNN-DT curve was found to be 0.9408 when compared to 0.7728 covered by the MFNN curve. The error of the curve for DNN-DT was about 2.5% against the error of about 4.7% exhibited by the MFNN curve. Based on the experimental study and the analysis, it can be concluded that the proposed discrete time dynamic neural network cognition model achieves a higher accuracy of about 25% when compared to the MFNN based cognition engine. # VI. # Conclusions The issues in security provisioning to networks can be addressed by cognitive networks. This paper proposes an OODA Loop based cognitive network. The use of discrete time dynamic neural networks to incorporate intelligence in the cognition loop is considered. The purpose of the cognitive network is to identify malicious user nodes in heterogeneous network environments. The malicious node identification is achieved by monitoring the service rates of the client nodes. Service provisioning of the services hosted by the cognitive servers to the malicious nodes is disabled hence improving performance and maintaining network integrity. The proposed system exhibits 25% higher malicious node detection efficiency and 12% higher malicious transaction classification accuracy when compared to the MFNN based cognition engine. The discrete time dynamic neural network based cognitive network proposed in this paper is an effective mechanism to identity malicious nodes and negates their presence in the considered heterogeneous network. 1![Figure 1 : Cognitive Network Model Graph](image-2.png ")Figure 1 :") ![](image-3.png "Volume") 2![Figure 2 : Cognition Cycle](image-4.png "Figure 2 :") 3![Figure 3 : A neuron structure of the Discrete Time Dynamic Neural Network Global Journal of Computer Science and Technology](image-5.png "Figure 3 :") ![28)At a time instance ?? 0 , the cognitive server ?? ?? ?? observes the received traffic is lessGlobal Journal of Computer Science and TechnologyVolume XIV Issue II Version I](image-6.png "") ??.Normal?? at a rate nodes request for services ?? offered by the ?? ?? ?? ???? ?? ?? and it can be stated that ?? ???? ?? ?? ? ?? ?? ?????????? ?? .Malicious activity is induced by introduction of additionalpackets into the network where by the transmission rateof the malicious node ?? ???? ???? ?? > ?? ?????? ?? of theYear 2014?? by the dynamic neural networks client nodes ?? ?? enables effective decision making and control strategies to be adopted to achieve cognition. The cognition process discussed is capable of handling service rate controls between the predefined limits, heterogeneous34client nodes, heterogeneous service traffic rates and server bandwidth control limits establishedVolume XIV Issue II Version I D D D D ) Eby ?? ?? ?????????? ?? The integrity and security provisioning of , ?? ?? ?????????? ?? . cognitive server ?? by the server ?? ?? ?? , the instantaneous response traffic rate is represented by ?? ?? ? (??). The rate ?? ?? ? (??)is considered as a function of the controlled traffic rate ?? ???? ?? ?? (??) and the offered traffic rate ?? ?? (??) in accordance to the action( Global Journal of Computer Science and Technologycontrol strategy. The total traffic rate observed by the cognitive server ?? ?? ?? is defined as ? ?? ?? ?? ?? ?? ? (??) ??=1or ?? ?? ?? eliminate such unjust actions let us consider the service based on the observations ?? ?? ?? . To request rate of the cognitive server ?? ?? ?? received to be represented as ?? ???? ?? ?? ?? ?? and it is defined as ?? ???? ?? ?? ?? ?? = ??? ?? ?????????? ?? + ?? ?? ?????????? ?? ? ?? ?????? (? ) (21) Where ?? ?????? (?) represents a constant and is a fraction of the service request packets sent from ?? ?? ?? to ?? ?? ?? . If the service request load ?? ???? ?? predetermined threshold ?? ?? ?????????? then the service request ?? ?? ???? ?? is below theacceptance is increased by a small volume representedas ?? . The cognitive servers monitor and accept theclient service requests through the controlled router?? (?). This action control strategy is represented as ?? ?? invoked every ?? second wherein the server load ?? ???? ?? ?? is ?? ?? adjusted to be within the limits set by ?? ?? ?????????? ?? and ?? ?? ?????????? ??© 2014 Global Journals Inc. (US) 1No.Cognition EngineNo. Servers (?? ?? )No. Routers (?? ?? )Mobility ModelChannel NoiseNo. Nodes (?? ?? )No. Malicious Nodes( ?? ?? ?? )1MFNN COGNITIVE ENGINE330RANDOM DIRECTIONALPRESENT200132MFNN COGNITIVE ENGINE330RANDOM DIRECTIONALABSENT20093 4 5MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE3 3 530 30 50RANDOM WAYPOINT RANDOM WAYPOINT RANDOM DIRECTIONALPRESENT ABSENT PRESENT200 200 2005 5 11Year 20146MFNN COGNITIVE ENGINE550RANDOM DIRECTIONALABSENT20014377 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE MFNN COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE DNN-DT COGNITIVE ENGINE5 5 7 7 7 7 3 3 3 3 5 5 5 5 7 7 7 750 50 70 70 70 70 30 30 30 30 50 50 50 50 70 70 70 70RANDOM WAYPOINT RANDOM WAYPOINT RANDOM DIRECTIONAL RANDOM DIRECTIONAL RANDOM WAYPOINT RANDOM WAYPOINT RANDOM DIRECTIONAL RANDOM WAYPOINT RANDOM WAYPOINT RANDOM DIRECTIONAL RANDOM DIRECTIONAL RANDOM WAYPOINT RANDOM WAYPOINT RANDOM DIRECTIONAL RANDOM DIRECTIONAL RANDOM WAYPOINT RANDOM WAYPOINT DIRECTIONAL RANDOMPRESENT ABSENT PRESENT ABSENT PRESENT ABSENT PRESENT PRESENT ABSENT PRESENT ABSENT PRESENT ABSENT PRESENT ABSENT PRESENT ABSENT ABSENT200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 200 20010 13 23 5 14 7 11 8 6 9 8 8 7 15 5 11 7 7Volume XIV Issue II Version I Global Journal of Computer Science and Technology ( D D D D D D D D ) 27 ). © 2014 Global Journals Inc. (US) * Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio IiiMitola 2000 Sweden Royal Institute of Technology PhD thesis * Cognitive Networks: Foundation to Applications D HFriend March 6, 2009 Blacksburg Electrical and Computer Engineering, Virginia Polytechnic and State Univ. Ph.D. Dissertation * Cognitive networks R WThomas L ADasilva A BMackenzie Proceedings of the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks the First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access NetworksBaltimore, USA November 8-11, 2005 * Cognitive Networks: Towards Self-Aware Networks QusayMahmoud 2007 Wiley Inter science * Nonlinear Systems Identification and Control via Dynamic Multi time Scales Neural Networks XuanHan WenFangXie ZhijunFu WeidongLuo IEEE Transactions Neural Networks and Learning Systems 2013 * Nonlinear systems identification using dynamic multi-time scale neural networks XuanHan WenFangXie ZhijunFu WeidongLuo Proce-e dings of the Neuro computation, October17 e-e dings of the Neuro computation, October17 2011 * The price of ignorance: distributed topology control in cognitive networks R SKomali R WThomas L ADasilva AMackenzie IEEE Transactions on Wireless Communications 9 4 April 2010 * A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks DaojingHe ChunChen SChan JiajunBu AVasilakos IEEE Transactions on Information Technology in Biomedicine 16 6 Nov. 2012 * IDSV: Intrusion Detection Algorithm Based on Statistics Variance Method in User Transmission Behavior TaoJun LinHui LiuChunlin Proceedings of International Conference on Computational and Sciences International Conference on Computational and Sciences Dec.17-19, 2010 * Anomaly detection in IP networks MThottan ChuanyiJi IEEE Transactions on Signal Processing 51 8 Aug. 2003 * Wireless Information Security Based on Cognitive Approaches StephenS C Lingareddy Charles KashyapVinayababu Dhruve IJCSNS International Journal of Computer Science and Network Security 9 12 2009 * Optimal max-min lifetime routing of multicasts in ad-hoc networks with directional antennas KerryWood ALuiz Dasilva Proceedings of International Conference on Broadband Networks (BROADNETS 05) International Conference on Broadband Networks (BROADNETS 05) October 2005 * MKubale Contemporary Mathematics Providence, Rhode Island American Mathematical Society 2004 Graph Colorings * Effect of selfish node behavior on efficient topology design A BR S Komali R PMackenzie Gilles IEEE Transactions on Mobile Computing 7 9 2008 * A secure mobile healthcare system using trust based multicast scheme ABoukerche YRen IEEE Journal on Selected Areas of Communications 27 4 May 2009 * An Ethernet address resolution protocol or converting network protocol addresses to 48 bit Ethernet address for transmission on Ethernet hardware CDavid Plummer Internet Request For Comments RFC 826 November 1982 * Research on weighted multi-random decision tree and its application to intrusion detection YeZhao Xiao Feng Zhen Journal of Computer Engineering and Applications Hefei University of Technology * Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection JSalvatore WeiStolfo WenkeFan AndreasLee PhilipKProdromidis Chan Proceedings of IEEE Symposium on Security and Privacy IEEE Symposium on Security and PrivacyOakland, CA May 1999 * Approach for local multidomain cognition in cognitive network ZhangWenzhu YiBohai IEEE Transactions on Communications 10 1 January 2013 * Applied Regression Analysis and Other Multivariable Methods D GKlein L LKupper ANizam 2008 Thomson Press Belmont, USA Fourth Edition * System Info of Multi-Domain Cognition in Cognitive Radio Networks DingGuoru WangJinlong WuQihui Proceedings of IEEE International Conference on Wireless Communications and Signal Processing IEEE International Conference on Wireless Communications and Signal ProcessingChina October 21-23, 2010 * Cognitive Approach Based User Node Activity Monitoring for Intrusion Detection in Wireless Networks GSunilkumar JThriveni K RVenugopal L MPatnaik International Journal of Computer Science Issues 9 3 March 2012 * Static and Dynamic Neural Networks: From Fundamentals to Advanced Theory MMadan LiangGupta NoriyasuJin Homma April 5, 2004 John Wiley & Sons