2,500
Views
4
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

An improved bio-inspired based intrusion detection model for a cyberspace

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon | (Reviewing editor)
Article: 1859667 | Received 10 Apr 2019, Accepted 01 Nov 2020, Published online: 11 Jan 2021

References

  • Aghdam, M. H., & Kabiri, P. (2016). Feature selection for intrusion detection system using ant colony optimization. International Journal of Network Security, 18(3), 420–23. http://ijns.femto.com.tw/contents/ijns-v18-n3/ijns-2016-v18-n3-p420-432.pdf
  • Aissa, N. B., & Guerroumi, M. (2016). Semi-supervised statistical approach for network anomaly detection. In Procedia Computer Science, The 6th International Symposium on Frontiers in Ambient and Mobile Systems (Vol. 83, pp. 1090–1095). Elsevier.
  • Akinyemi, B. O., Adekunle, J. B., Aladesanmi, T. A., Aderounmu, G. A., & Kamagaté, B. H. (2019). An improved anomalous intrusion detection model. FUOYE Journal of Engineering and Technology, 4(2), 81–88. https://doi.org/10.46792/fuoyejet.v4i2.418
  • Akinyemi, B. O., Amoo, A. O., & Aderounmu, G. A. (2015). Performance prediction model for network security risk management. Communications on Applied Electronics (CAE), 2(8), 1–7. https://doi.org/10.5120/cae2015651816.
  • Al-Barazanchi, K. K., Al-Neami, A., & Qand Al-Timemy, A. H. (2017). Ensemble of bagged tree classifier for the diagnosis of neuromuscular disorders. In IEEE 2017 Fourth International Conference on Advances in Biomedical Engineering (ICABME), Beirut. https://doi.org/10.1109/ICABME.2017.8167564
  • Aljarah, I., & Ludwig, S. A. (2013). MapReduce intrusion detection system based on a particle swarm optimization clustering algorithm. In Proceedings of 2013 IEEE Congress on Evolutionary Computation, Cancun, Mexico. https://doi.org/10.1109/CEC.2013.6557670.
  • Amudha, P., Karthik, S., & Sivakumari, S. (2015). A hybrid swarm intelligence algorithm for intrusion detection using significant features. The Scientific World Journal. Hindawi Publishing Corporation, 2015, Article ID 574589. https://doi.org/10.1155/2015/574589.
  • Andress, J. (2014). Cyber warfare: Techniques, tactics and tools for security practitioners (2nd ed ed.). eBook, Elsevier.
  • Anter, A. M., Hassanien, A. E., Elsoud, M. A., & Kim, T.-H. (2015). Feature selection approach based on social spider algorithm: Case study on abdominal CT liver tumor. In Proceedings of IEEE, Seventh International Conference on Advanced Communication and Networking (ACN '15) (pp. 89–94).
  • Bamakan, S. M. H., Amiri, B., Mirzabagheri, M., & Shi, Y. (2015). A new intrusion detection approach using pso based multiple criteria linear programming. Procedia Computer Science. Elsevier, 55(2015), 231–237. https://doi.org/10.1016/j.procs.2015.07.040
  • Barrantes, G., & Weng, J. L. (2006). The prey attack behavior of achaearanea Tesselata(ARANEAE, THERIDIIDAE). The Journal of Arachnology, 34(2), 456–466. https://doi.org/10.1636/S05-73.1
  • Biere, J. M., & Uetz, G. W. (1981). Web orientation in the spider Micrathena gracilis (Araneae: Araneidae). Ecology, 62(2), 336–344. https://doi.org/10.2307/1936708
  • Chandran, T. R., Reddy, A. V., & Janet, B. (2017). Text clustering quality improvement using a hybrid social spider optimization. International Journal of Applied Engineering Research, 12(6), 995–1008. https://www.ripublication.com/ijaer17/ijaerv12n6_31.pdf
  • Chhikara, P., & Patel, A. K. (2013). Enhancing network security using ant colony optimization. Global Journal of Computer Science and Technology Network, Web & Security, 13(4), 19–22. https://globaljournals.org/GJCST_Volume13/3-Enhancing-Network-Security.pdf
  • Chung, Y. Y., & Wahid, N. (2012). A hybrid network intrusion detection system using simplified swarm optimization (SSO). Applied Soft Computing, 12(9), 3014–3022. https://doi.org/10.1016/j.asoc.2012.04.020
  • Colorni, A., Dorigo, M., & Maniezzo, V. (1991). Distributed optimization by ant colonies. In F. Varela & P. Bourgine (Eds.), Proceedings of ECAL91 - European Conference on Artificial Life (pp. 134–142). Elsevier Publishing.
  • Cuevas, E., Cienfuegos, M., Zaldívar, D., & Pérez-Cisneros, M. (2013). A swarm optimization algorithm inspired in the behavior of the social-spider. Expert Systems with Applications, 40(16), 6374–6384. https://doi.org/10.1016/j.eswa.2013.05.041
  • Dorigo, M., Maniezzo, V., & Alberto, C. (1996). Ant System: Optimization by a Colony of Cooperating Agents. IEEE Transactions on System, Man, and Cybernitics-PartB: Cybernetics, 26(1), 29–41. https://doi.org/10.1109/3477.484436
  • Dorigo, M., Maniezzo, V., & Colorni, A. (1991). Ant system: An autocatalytic optimizing process Technical Report 91–016, 1–21.
  • Kavitha, K., & Ranjitha, K. (2013). Particle Swarm Optimization For Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller. International Journal of Computer Trends and Technology (IJCTT), 4(10), 3536–3541. https://www.ijcttjournal.org/archives/1220-ijctt-v4i10p130
  • Khan, K., Nikov, A., & Sahai, A. (2011). A fuzzy bat clustering method for ergonomic screening of office workplaces. Advances in Intelligent and Soft Computing, 101, 59–66
  • Komarasamy, G., & Wahi, A. (2012). An optimized k-means clustering technique using bat algorithm. European Journal of Scientific Research, 84 (2), 263–273. http://www.europeanjournalofscientificresearch.com
  • Kotsiantis, S., Tsekouras, G., & Pintelas, P. (2005). Bagging model trees for classification problems. In P. Bozanis & E. N. Houstis (Eds.), Proceedings of advances in Informatics, 10th Panhellenic Conference on Informatics (pp. 328–337). PCI 2005, LNCS 3746.
  • Kumar, K. P. M. (2013). Intrusion Detection System for Malicious Traffic by using PSO-GA Algorithm. International Journal of Computer Science & Engineering Technology, 3(6), 236–238. https://ijcset.net/docs/Volumes/volume3issue6/ijcset2013030606.pdf
  • Kumutha, V., & Palaniammal, S. (2014). Improved fuzzy clustering method based on intuitionistic fuzzy particle swarm optimization. Journal of Theoretical and Applied Information Technology, 62(1), 8–15. http://www.jatit.org/volumes/Vol62No1/2Vol62No1.pdf
  • Li, Z., Li, Y., & Xu, L.(2011). Anomaly intrusion detection method based on K-means clustering algorithm with particle swarm optimization. In Proceedings of IEEE International Conference of Information Technology, Computer Engineering and Management Sciences . IEEE Computer Society. pp. 157–161.
  • Liao, H. J., Lin, C. H. R., Lin, Y. C., & Tung, K. Y. (2013). Intrusion Detection System: A Comprehensive Review. Journal of Network and Computer Applications. Elsevier, 36(1), 16–24. https://doi.org/10.1016/j.jnca.2012.09.004
  • Mahmod, M. S., & Alnaish, Z. A. H. (2015). Hybrid intrusion detection system using artificial bee colony algorithm and multi-layer perceptron. International Journal of Computer Science and Information Security(IJCSIS), 13(2), 1–7.
  • Maurer, T. (2011). Cyber Norm Emergence at the United Nations-An Analysis of the UN’s Activities Regarding Cyber-security. In Explorations in Cyber International Relations Discussion Paper Series,Discussion Paper 2011–11. Harvard's Belfer Center for Science and International Affairs.(pp. 02138).
  • Nejad, N. K., Jabbehdari, S., & Moattar, M. H. (2015). A Hybrid Intrusion Detection System Using Particle Swarm Optimization For Feature Selection.International Journal of Soft Computing and Artificial Intelligence, 3(2), 55–58. http://www.iraj.in/journal/journal_file/journal_pdf/4-204-145127841455-58.pdf
  • Niu, Q., & Huang, X. (2011). An improved fuzzy cmeans clustering algorithm based on PSO. Journal of Software, 6(5), 873–879. https://doi.org/10.4304/jsw.6.5.873-879
  • Otor, S. U., Akinyemi, B. O., Aladesanmi, T. A., Aderounmu, G. A., & Kamagaté, B. H. Saurabh Pratap (Reviewing editor). (2019). An adaptive bio-inspired optimisation model based on the foraging behaviour of a social spider. Cogent Engineering, 6(1), 1588681. https://doi.org/10.1080/23311916.2019.1588681
  • Scarfone, K., & Mell, P., (2012). Guide to Intrusion Detection and Prevention Systems (IDPS) (Draft): Recommendations of the National Institute of Standards and Technology NIST Special Publication. 800–894. Revision 1 (Draft). https://www.hsdl.org/?view&did=718849
  • Sharma, N., & Gaur, B. (2016). An Approach for efficient intrusion detection based on R-ACO. International Journal of Advanced Technology and Engineering Exploration, 3(20), 98–104. https://doi.org/10.19101/IJATEE.2016.320005
  • Shukla, U. P., & Nanda, S. J. (2016). Parallel social spider clustering algorithm for high dimensional datasets. Engineering Applications of Artificial Intelligence. Elsevier, 56(2016) 75–90. https://doi.org/10.1016/j.engappai.2016.08.013
  • Sreelaja, N. K., & Vijayalakshmi, P. G. A. (2010). Ant Colony Optimization based approach for efficient packet filtering in firewall. Applied Soft Computing, 10(4), 1222–1236. https://doi.org/10.1016/j.asoc.2010.03.009
  • Sreelaja, N. K., & Vijayalakshmi, P. G. A. (2014). Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Applied Soft Computing, 19(2014), 68–79. https://doi.org/10.1016/j.asoc.2014.01.015
  • Sujitha, B. B., & Kavitha, V. (2015). Layered approach for intrusion detection using multiobjective particle swarm optimization. International Journal of Applied Engineering Research Research 10(12), 31999–32014.
  • Tsai, C. Y., & Chen, C. J. (2015). A PSO-AB classifier for solving sequence classification problems. Applied Soft Computing. Elsevier, 27(2015), 11–27. https://doi.org/10.1016/j.asoc.2014.10.029
  • Wan, Y., Wang, M., Ye, Z., & Lai, X. (2016). A feature selection method based on modified binary coded ant colony optimization algorithm. Applied Soft Computing, 49(2016), 248-258.https://doi.org/10.1016/j.asoc.2016.08.011
  • WaterISAC. (2015). Best practice to reduce exploitable weaknesses and attacks: 10 Basic cybersecurity measures. https://ics-cert.us-cert.gov/sites/default/files/documents/10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf
  • Xingzhu, W. (2015). ACO and SVM selection feature weighting of network intrusion detection method. International Journal of Security and Its Applications, 9(4), 129–270. https://doi.org/10.14257/ijsia.2015.9.4.24
  • Yang, X. (2014). A framework for self-tuning algorithms. In Nature-inspired optimization algorithms -Chapter 12. Elsevier. pp. 175–182. .https://doi.org/10.1016/B978-0-12-416743-8.00012-9.
  • Zheng, H. (2011). An efficient hybrid clustering-PSO algorithm for anomaly intrusion detection. Journal Of Software. Academy Publisher, 6(12), 2350–2360. https://doi.org/10.4304/jsw.6.12.2350-2360
  • Zhou, Y., Zhou, Y., Luo, Q., & Abdel-Basset, M. (2017). A simplex method-based social spider optimization algorithm for clusteringanalysis. Engineering Applications of Artificial Intelligence. Elsevier, 64(2017), 67–82. https://doi.org/10.1016/j.engappai.2017.06.004
  • Zhu, H., & Li, X. (2016). Research on a new method based on improved ACO algorithm and SVM model for data classification. International Journal of Database Theory and Application, 9(1), 217–226. https://doi.org/10.14257/ijdta.2016.9.1.19