SECURING IT NETWORKING ENVIRONMENT IN CRAN USING DEHAENE–CHANGEUX MODEL DRIVEN MOTH-FLAME OPTIMIZATION
Abstract
In the dynamic landscape of telecommunications, the evolution of Communication Radio Access Networks (CRAN) has introduced unprecedented challenges to the security of IT networking environments. As the demand for high-speed connectivity and seamless data transmission grows, safeguarding CRAN becomes paramount. With the proliferation of cyber-attacks and the complexity of CRAN architecture, conventional security measures prove insufficient, necessitating an innovative and adaptive approach. Existing methodologies lack the adaptability required to combat emerging threats effectively. This research bridges this gap by proposing the integration of the Dehaene–Changeux Model, renowned for its applicability in cognitive neuroscience, with Moth-Flame Optimization, a nature-inspired algorithm known for its efficiency in solving complex optimization problems. This research addresses the pressing need for a robust security framework using the Dehaene–Changeux Model Driven Moth-Flame Optimization approach. It elucidates the utilization of the Dehaene–Changeux Model to mimic cognitive responses, coupled with Moth-Flame Optimization for real-time adaptability. These models form a dynamic defense mechanism against evolving security threats in the CRAN environment. Results obtained from simulation and testing validate the efficacy of the proposed security model. The adaptive nature of the Dehaene–Changeux Model, combined with the optimization capabilities of Moth-Flame Optimization, showcases a significant enhancement in CRAN security. The research contributes a pioneering solution to fortify IT networking environments in CRAN, ensuring resilience against current and future cyber threats.

Authors
Rahul Laxmanrao Paikrao1, Prashant Laxmanrao Paikrao2
Amrutvahini College of Engineering, Sangamner, India1, Government College of Engineering, Amravati, India2

Keywords
CRAN, Dehaene–Changeux Model, Moth-Flame Optimization, IT networking security, Cognitive Security
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
652000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 14 , Issue: 4 , Pages: 3071 - 3078 )
Date of Publication :
December 2023
Page Views :
262
Full Text Views :
16

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.