Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurityopen access

Authors
Shandilya, Shishir KumarChoi, Bong JunKumar, AjitUpadhyay, Saket
Issue Date
Mar-2023
Publisher
MDPI
Keywords
adaptive defense; nature-inspired cybersecurity; firefly algorithm; information security; early intrusion detection
Citation
PROCESSES, v.11, no.3
Journal Title
PROCESSES
Volume
11
Number
3
URI
http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/43879
DOI
10.3390/pr11030715
ISSN
2227-9717
Abstract
The new paradigm of nature-inspired cybersecurity can establish a robust defense by utilizing well-established nature-inspired computing algorithms to analyze networks and act quickly. The existing research focuses primarily on the efficient selection of features for quick and optimized detection rates using firefly and other nature-inspired optimization techniques. However, selecting the most appropriate features may be specific to the network, and a different set of features may work better than the selected one. Therefore, there is a need for a generalized pre-processing step based on the standard network monitoring parameters for the early detection of suspicious nodes before applying feature-based or any other type of monitoring. This paper proposes a modified version of the firefly optimization algorithm to effectively monitor the network by introducing a novel health function for the early detection of suspicious nodes. We implement event management schemes based on the proposed algorithm and optimize the observation priority list based on a genetic evolution algorithm for real-time events in the network. The obtained simulation results demonstrate the effectiveness of the proposed algorithm under various attack scenarios. In addition, the results indicate that the proposed method reduces approximately 60-80% of the number of suspicious nodes while increasing the turnaround time by only approximately 1-2%. The proposed method also focuses specifically on accurate network health monitoring to protect the network proactively.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Choi, Bong Jun photo

Choi, Bong Jun
College of Information Technology (School of Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE