Skip to main content
Top
Published in: Arabian Journal for Science and Engineering 8/2020

31-03-2020 | Research Article-Computer Engineering and Computer Science

A Modified Multi-objective Particle Swarm Optimizer-Based Lévy Flight: An Approach Toward Intrusion Detection in Internet of Things

Authors: Maria Habib, Ibrahim Aljarah, Hossam Faris

Published in: Arabian Journal for Science and Engineering | Issue 8/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The emerging of the Internet of things (IoT), and more, the advent of the Internet of everything have revolutionized the computer networks industry. The high diversity of IoT devices, its protocols and standards, and its limited computational resources have led to the appearance of novel security challenges. Hence, the traditional security countermeasures of encryption and authentication are insufficient. Promoting the network security is a fundamental concern for practitioners for safeguarding their economical and industrial strategies. Intrusion detection systems (IDSs) are the major solutions for protecting Internet-connected frameworks at the network-level. But, more importantly, is how to convert the traditional IDSs into intelligent IDSs that resemble the intelligent IoT. This paper presents a new approach for converting the traditional IDSs into smart, evolutionary, and multi-objective IDSs for IoT networks. Moreover, this article presents a modified algorithm for IDSs that tackles the problem of feature selection. The modified algorithm stands on the integration of multi-objective particle swarm optimization with Lévy flight randomization component (MOPSO-Lévy); the modified MOPSO-Lévy has been tested on real IoT network data that is drawn from UCI repository. MOPSO-Lévy has achieved superior performance results when compared with state-of-the-art evolutionary multi-objective algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Conti, M.; Dehghantanha, A.; Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities (2018) Conti, M.; Dehghantanha, A.; Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities (2018)
2.
go back to reference Hemdan, E.E.-D.; Manjaiah, D.H.: Cybercrimes investigation and intrusion detection in internet of things based on data science methods. In: Cognitive Computing for Big Data Systems Over IoT, pp. 39–62. Springer, Berlin (2018) Hemdan, E.E.-D.; Manjaiah, D.H.: Cybercrimes investigation and intrusion detection in internet of things based on data science methods. In: Cognitive Computing for Big Data Systems Over IoT, pp. 39–62. Springer, Berlin (2018)
3.
go back to reference Yang, X.-S.: Nature-Inspired Metaheuristic Algorithms. Luniver Press, Beckington (2010) Yang, X.-S.: Nature-Inspired Metaheuristic Algorithms. Luniver Press, Beckington (2010)
4.
go back to reference Faris, H.; Aljarah, I.; Mirjalili, S.: Improved monarch butterfly optimization for unconstrained global search and neural network training. Appl. Intell. 48, 445–464 (2018) Faris, H.; Aljarah, I.; Mirjalili, S.: Improved monarch butterfly optimization for unconstrained global search and neural network training. Appl. Intell. 48, 445–464 (2018)
5.
go back to reference Faris, H.; Aljarah, I.; Al-Madi, N.; Mirjalili, S.: Optimizing the learning process of feedforward neural networks using lightning search algorithm. Int. J. Artif. Intell. Tools 25(6), 1650033 (2016) Faris, H.; Aljarah, I.; Al-Madi, N.; Mirjalili, S.: Optimizing the learning process of feedforward neural networks using lightning search algorithm. Int. J. Artif. Intell. Tools 25(6), 1650033 (2016)
6.
go back to reference Faris, H.; Aljarah, I.; Alqatawna, J.F.: Optimizing feedforward neural networks using krill herd algorithm for e-mail spam detection. In: 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1–5. IEEE (2015) Faris, H.; Aljarah, I.; Alqatawna, J.F.: Optimizing feedforward neural networks using krill herd algorithm for e-mail spam detection. In: 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1–5. IEEE (2015)
8.
go back to reference Faris, H.; Aljarah, I.; Mirjalili, S.; Castillo, P.A.; Guervós, J.J.M.: EvoloPy: an open-source nature-inspired optimization framework in Python. In: IJCCI (ECTA), pp. 171–177 (2016) Faris, H.; Aljarah, I.; Mirjalili, S.; Castillo, P.A.; Guervós, J.J.M.: EvoloPy: an open-source nature-inspired optimization framework in Python. In: IJCCI (ECTA), pp. 171–177 (2016)
9.
go back to reference Aljarah, I.; Mafarja, M.; Heidari, A.A.; Faris, H.; Mirjalili, S.: Multi-verse optimizer: theory, literature review, and application in data clustering. In: Nature-Inspired Optimizers, pp. 123–141. Springer, Cham (2020) Aljarah, I.; Mafarja, M.; Heidari, A.A.; Faris, H.; Mirjalili, S.: Multi-verse optimizer: theory, literature review, and application in data clustering. In: Nature-Inspired Optimizers, pp. 123–141. Springer, Cham (2020)
10.
go back to reference Heidari, A.A.; Faris, H.; Mirjalili, S.; Aljarah, I.; Mafarja, M.: Ant lion optimizer: theory, literature review, and application in multi-layer perceptron neural networks. In: Nature-Inspired Optimizers, pp. 23–46. Springer, Cham (2020) Heidari, A.A.; Faris, H.; Mirjalili, S.; Aljarah, I.; Mafarja, M.: Ant lion optimizer: theory, literature review, and application in multi-layer perceptron neural networks. In: Nature-Inspired Optimizers, pp. 23–46. Springer, Cham (2020)
11.
go back to reference Aljarah, I.; Faris, H.; Mirjalili, S.; Al-Madi, N.; Sheta, A.; Mafarja, M.: Evolving neural networks using bird swarm algorithm for data classification and regression applications. Cluster Comput. 22(4), 1317–1345 (2019) Aljarah, I.; Faris, H.; Mirjalili, S.; Al-Madi, N.; Sheta, A.; Mafarja, M.: Evolving neural networks using bird swarm algorithm for data classification and regression applications. Cluster Comput. 22(4), 1317–1345 (2019)
12.
go back to reference Yang, X.-S.; Metaheuristic optimization: algorithm analysis and open problems. In: International Symposium on Experimental Algorithms, pp. 21–32. Springer, Berlin (2011) Yang, X.-S.; Metaheuristic optimization: algorithm analysis and open problems. In: International Symposium on Experimental Algorithms, pp. 21–32. Springer, Berlin (2011)
13.
go back to reference Deb, K.; Kalyanmoy, D.: Multi-objective Optimization Using Evolutionary Algorithms. Wiley, New York (2001)MATH Deb, K.; Kalyanmoy, D.: Multi-objective Optimization Using Evolutionary Algorithms. Wiley, New York (2001)MATH
14.
go back to reference Dheeru, D.; Taniskidou, E.K.: UCI machine learning repository (2017) Dheeru, D.; Taniskidou, E.K.: UCI machine learning repository (2017)
15.
go back to reference Deb, K.; Agrawal, S.; Pratap, A.; Meyarivan, T.: A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: Nsga-ii. In: International Conference on Parallel Problem Solving from Nature, pp. 849–858. Springer, Berlin (2000) Deb, K.; Agrawal, S.; Pratap, A.; Meyarivan, T.: A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: Nsga-ii. In: International Conference on Parallel Problem Solving from Nature, pp. 849–858. Springer, Berlin (2000)
16.
go back to reference Corne, D.W; Jerram, N.R.; Knowles, J.D.; Oates, M.J.: Pesa-ii: region-based selection in evolutionary multiobjective optimization. In: Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation, pp. 283–290. Morgan Kaufmann Publishers Inc. (2001) Corne, D.W; Jerram, N.R.; Knowles, J.D.; Oates, M.J.: Pesa-ii: region-based selection in evolutionary multiobjective optimization. In: Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation, pp. 283–290. Morgan Kaufmann Publishers Inc. (2001)
17.
go back to reference Zitzler, E.; Laumanns, M.; Thiele, L.: Spea2: improving the strength Pareto evolutionary algorithm. TIK-report, 103 (2001) Zitzler, E.; Laumanns, M.; Thiele, L.: Spea2: improving the strength Pareto evolutionary algorithm. TIK-report, 103 (2001)
18.
go back to reference Zhang, Q.; Li, H.: MOEA/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans. Evol. Comput. 11(6), 712–731 (2007) Zhang, Q.; Li, H.: MOEA/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans. Evol. Comput. 11(6), 712–731 (2007)
19.
go back to reference Zarpelao, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017) Zarpelao, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C.: A survey of intrusion detection in internet of things. J. Netw. Comput. Appl. 84, 25–37 (2017)
20.
go back to reference Moustafa, N.; Turnbull, B.; Choo, K.-K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 6(3), 4815–4830 (2018) Moustafa, N.; Turnbull, B.; Choo, K.-K.R.: An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things. IEEE Internet Things J. 6(3), 4815–4830 (2018)
21.
go back to reference Deng, L.; Li, D.; Yao, X.; Cox, D.; Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Comput. 1–16 (2018) Deng, L.; Li, D.; Yao, X.; Cox, D.; Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Cluster Comput. 1–16 (2018)
22.
go back to reference Xiao, L.; Wan, X.; Xiaozhen, L.; Zhang, Y.; Di, W.: Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018) Xiao, L.; Wan, X.; Xiaozhen, L.; Zhang, Y.; Di, W.: Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)
23.
go back to reference Diro, A.A.; Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Future Gener. Comput. Syst. 82, 761–768 (2018) Diro, A.A.; Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for internet of things. Future Gener. Comput. Syst. 82, 761–768 (2018)
24.
go back to reference Li, D.; Deng, L.; Lee, M.; Wang, H.: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manag. 49, 533–545 (2019) Li, D.; Deng, L.; Lee, M.; Wang, H.: IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manag. 49, 533–545 (2019)
25.
go back to reference Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E.: Machine learning in IoT security: current solutions and future challenges. arXiv preprint arXiv:1904.05735 (2019) Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E.: Machine learning in IoT security: current solutions and future challenges. arXiv preprint arXiv:​1904.​05735 (2019)
26.
go back to reference da Costa, K.A.P.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C.: Internet of things: a survey on machine learning-based intrusion detection approaches. Comput. Netw. 151, 147–157 (2019) da Costa, K.A.P.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C.: Internet of things: a survey on machine learning-based intrusion detection approaches. Comput. Netw. 151, 147–157 (2019)
27.
go back to reference Azmoodeh, A.; Dehghantanha, A.; Conti, M.; Choo, K.-K.R.: Detecting crypto-ransomware in iot networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4), 1141–1152 (2018) Azmoodeh, A.; Dehghantanha, A.; Conti, M.; Choo, K.-K.R.: Detecting crypto-ransomware in iot networks based on energy consumption footprint. J. Ambient Intell. Humaniz. Comput. 9(4), 1141–1152 (2018)
28.
go back to reference Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y.: N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018) Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y.: N-baiot—network-based detection of iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)
29.
go back to reference Alhajri, R.; Zagrouba, R.; Al-Haidari, F.: Survey for anomaly detection of iot botnets using machine learning auto-encoders. Int. J. Appl. Eng. Res. 14(10), 2417–2421 (2019) Alhajri, R.; Zagrouba, R.; Al-Haidari, F.: Survey for anomaly detection of iot botnets using machine learning auto-encoders. Int. J. Appl. Eng. Res. 14(10), 2417–2421 (2019)
30.
go back to reference Mohamed, T.A.; Otsuka, T.; Ito, T.: Towards machine learning based IoT intrusion detection service. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 580–585. Springer (2018) Mohamed, T.A.; Otsuka, T.; Ito, T.: Towards machine learning based IoT intrusion detection service. In: International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, pp. 580–585. Springer (2018)
31.
go back to reference Rathore, S.; Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79–89 (2018) Rathore, S.; Park, J.H.: Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft Comput. 72, 79–89 (2018)
32.
go back to reference Mishra, S.; Sagban, R.; Yakoob, A.; Gandhi, N.: Swarm intelligence in anomaly detection systems: an overview. Int. J. Comput. Appl. 1–10 (2018) Mishra, S.; Sagban, R.; Yakoob, A.; Gandhi, N.: Swarm intelligence in anomaly detection systems: an overview. Int. J. Comput. Appl. 1–10 (2018)
33.
go back to reference Almomani, A.; Alweshah, M.; Al, S.: Metaheuristic algorithms-based feature selection approach for intrusion detection. In: Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (2019) Almomani, A.; Alweshah, M.; Al, S.: Metaheuristic algorithms-based feature selection approach for intrusion detection. In: Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices (2019)
34.
go back to reference Sreenivasamurthy, S.; Obraczka, K.: Clustering for load balancing and energy efficiency in IoT applications. In: 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 319–332. IEEE (2018) Sreenivasamurthy, S.; Obraczka, K.: Clustering for load balancing and energy efficiency in IoT applications. In: 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 319–332. IEEE (2018)
35.
go back to reference Téllez, Nadim; Jimeno, Miguel; Salazar, Augusto; Nino-Ruiz, E: A tabu search method for load balancing in fog computing. Int. J. Artif. Intell. 16(2) (2018) Téllez, Nadim; Jimeno, Miguel; Salazar, Augusto; Nino-Ruiz, E: A tabu search method for load balancing in fog computing. Int. J. Artif. Intell. 16(2) (2018)
36.
go back to reference Rana, S.; Hossain, S.; Shoun, H.I.; Abul Kashem, M.: An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int. J. Adv. Comput. Sci. Appl. 9(11), 267–275 (2018) Rana, S.; Hossain, S.; Shoun, H.I.; Abul Kashem, M.: An effective lightweight cryptographic algorithm to secure resource-constrained devices. Int. J. Adv. Comput. Sci. Appl. 9(11), 267–275 (2018)
37.
go back to reference Zhanyang, X.; Renhao, G.; Huang, T.; Xiang, H.; Zhang, X.; Qi, L.; Xiaolong, X.: An IoT-oriented offloading method with privacy preservation for cloudlet-enabled wireless metropolitan area networks. Sensors 18(9), 3030 (2018) Zhanyang, X.; Renhao, G.; Huang, T.; Xiang, H.; Zhang, X.; Qi, L.; Xiaolong, X.: An IoT-oriented offloading method with privacy preservation for cloudlet-enabled wireless metropolitan area networks. Sensors 18(9), 3030 (2018)
38.
go back to reference Xue, Y.; Jia, W.; Zhao, X.; Pang, W.: An evolutionary computation based feature selection method for intrusion detection. Secur. Commun. Netw. (2018) Xue, Y.; Jia, W.; Zhao, X.; Pang, W.: An evolutionary computation based feature selection method for intrusion detection. Secur. Commun. Netw. (2018)
39.
go back to reference Sangeetha, A.L.; Bharathi, N.; Ganesh, A.B.; Radhakrishnan, T.K.: Particle swarm optimization tuned cascade control system in an internet of things (IoT) environment. Measurement 117, 80–89 (2018) Sangeetha, A.L.; Bharathi, N.; Ganesh, A.B.; Radhakrishnan, T.K.: Particle swarm optimization tuned cascade control system in an internet of things (IoT) environment. Measurement 117, 80–89 (2018)
40.
go back to reference Elhoseny, M.; Shankar, K.; Lakshmanaprabu, S.K.; Maseleno, A.; Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput. Appl. 1–15 (2018) Elhoseny, M.; Shankar, K.; Lakshmanaprabu, S.K.; Maseleno, A.; Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput. Appl. 1–15 (2018)
41.
go back to reference Tama, B.A.; Rhee, K.-H.: An integration of PSO-based feature selection and random forest for anomaly detection in ToT network. In: MATEC Web of Conferences, vol. 159, pp. 01053. EDP Sciences (2018) Tama, B.A.; Rhee, K.-H.: An integration of PSO-based feature selection and random forest for anomaly detection in ToT network. In: MATEC Web of Conferences, vol. 159, pp. 01053. EDP Sciences (2018)
42.
go back to reference Kesavamoorthy, R.; Soundar, K.R.: Swarm intelligence based autonomous DDOS attack detection and defense using multi agent system. Cluster Comput. 22(4), 9469–9476 (2018) Kesavamoorthy, R.; Soundar, K.R.: Swarm intelligence based autonomous DDOS attack detection and defense using multi agent system. Cluster Comput. 22(4), 9469–9476 (2018)
43.
go back to reference Selvarani, P.; Suresh, A.; Malarvizhi, N.: Secure and optimal authentication framework for cloud management using HGAPSO algorithm. Cluster Comput. 22(2), 4007–4016 (2018) Selvarani, P.; Suresh, A.; Malarvizhi, N.: Secure and optimal authentication framework for cloud management using HGAPSO algorithm. Cluster Comput. 22(2), 4007–4016 (2018)
44.
go back to reference Sun, Z.; Zhang, Z.; Xiao, C.; Gang, Q.: Ds evidence theory based trust ant colony routing in WSN. China Commun. 15(3), 27–41 (2018) Sun, Z.; Zhang, Z.; Xiao, C.; Gang, Q.: Ds evidence theory based trust ant colony routing in WSN. China Commun. 15(3), 27–41 (2018)
45.
go back to reference Li, J.; Zhao, Z.; Li, R.; Zhang, H.; Zhang, T.: Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J. 6(2), 2093–2102 (2018) Li, J.; Zhao, Z.; Li, R.; Zhang, H.; Zhang, T.: Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J. 6(2), 2093–2102 (2018)
46.
go back to reference Li, S.; Bi, F.; Chen, W.; Miao, X.; Liu, J.; Tang, C.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018) Li, S.; Bi, F.; Chen, W.; Miao, X.; Liu, J.; Tang, C.: An improved information security risk assessments method for cyber-physical-social computing and networking. IEEE Access 6, 10311–10319 (2018)
47.
go back to reference Sanchez-Pi, N.; Martí, L.; Molina, J.M.: Applying voreal for IoT intrusion detection. In: International Conference on Hybrid Artificial Intelligence Systems, pp. 363–374. Springer (2018) Sanchez-Pi, N.; Martí, L.; Molina, J.M.: Applying voreal for IoT intrusion detection. In: International Conference on Hybrid Artificial Intelligence Systems, pp. 363–374. Springer (2018)
48.
go back to reference Suman, C.; Tripathy, S.; Saha, S.: Building an effective intrusion detection system using unsupervised feature selection in multi-objective optimization framework. arXiv preprint arXiv:1905.06562 (2019) Suman, C.; Tripathy, S.; Saha, S.: Building an effective intrusion detection system using unsupervised feature selection in multi-objective optimization framework. arXiv preprint arXiv:​1905.​06562 (2019)
49.
go back to reference Al Shorman, A.; Faris, H.; Aljarah, I.: Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for iot botnet detection. J. Ambient Intell. Humaniz. Comput. 1–17 (2019) Al Shorman, A.; Faris, H.; Aljarah, I.: Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for iot botnet detection. J. Ambient Intell. Humaniz. Comput. 1–17 (2019)
50.
go back to reference Coello, C.A.C.; Pulido, G.T.: Handling multiple objectives with particle swarm optimization. IEEE Trans. Evol. Comput. 8(3), 256–279 (2004) Coello, C.A.C.; Pulido, G.T.: Handling multiple objectives with particle swarm optimization. IEEE Trans. Evol. Comput. 8(3), 256–279 (2004)
51.
go back to reference Kennedy, J.; Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104–4108. IEEE (1997) Kennedy, J.; Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104–4108. IEEE (1997)
52.
go back to reference Mirjalili, S.; Lewis, A.: S-shaped versus v-shaped transfer functions for binary particle swarm optimization. Swarm Evolut. Comput. 9, 1–14 (2013) Mirjalili, S.; Lewis, A.: S-shaped versus v-shaped transfer functions for binary particle swarm optimization. Swarm Evolut. Comput. 9, 1–14 (2013)
53.
go back to reference Han, J.; Pei, J.; Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)MATH Han, J.; Pei, J.; Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)MATH
54.
go back to reference Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175–185 (1992)MathSciNet Altman, N.S.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175–185 (1992)MathSciNet
55.
go back to reference Mohemmed, A.W.; Zhang, M.: Evaluation of particle swarm optimization based centroid classifier with different distance metrics. In: 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), pp. 2929–2932. IEEE (2008) Mohemmed, A.W.; Zhang, M.: Evaluation of particle swarm optimization based centroid classifier with different distance metrics. In: 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence), pp. 2929–2932. IEEE (2008)
56.
go back to reference Coello, C.A.C.; Lechuga, M.S.: Mopso: a proposal for multiple objective particle swarm optimization. In: Proceedings of the 2002 Congress on Evolutionary Computation. CEC’02 (Cat. No. 02TH8600), vol. 2, pp. 1051–1056. IEEE (2002) Coello, C.A.C.; Lechuga, M.S.: Mopso: a proposal for multiple objective particle swarm optimization. In: Proceedings of the 2002 Congress on Evolutionary Computation. CEC’02 (Cat. No. 02TH8600), vol. 2, pp. 1051–1056. IEEE (2002)
57.
go back to reference Zheng, X.; Liu, H.: A hybrid vertical mutation and self-adaptation based MOPSO. Comput. Math. Appl. 57(11–12), 2030–2038 (2009)MathSciNetMATH Zheng, X.; Liu, H.: A hybrid vertical mutation and self-adaptation based MOPSO. Comput. Math. Appl. 57(11–12), 2030–2038 (2009)MathSciNetMATH
58.
go back to reference Chechkin, A.V.; Metzler, R.; Klafter, J.; Gonchar, V.Y.; et al.: Introduction to the theory of Lévy flights. Anomalous Transp. Found. Appl. 49(2), 431–451 (2008) Chechkin, A.V.; Metzler, R.; Klafter, J.; Gonchar, V.Y.; et al.: Introduction to the theory of Lévy flights. Anomalous Transp. Found. Appl. 49(2), 431–451 (2008)
59.
go back to reference Kuhn, M.; Johnson, K.: Applied Predictive Modeling, vol. 26. Springer, Berlin (2013)MATH Kuhn, M.; Johnson, K.: Applied Predictive Modeling, vol. 26. Springer, Berlin (2013)MATH
60.
go back to reference Lee, C.-Y.; Yao, X.: Evolutionary programming using mutations based on the Lévy probability distribution. IEEE Trans. Evol. Comput. 8(1), 1–13 (2004) Lee, C.-Y.; Yao, X.: Evolutionary programming using mutations based on the Lévy probability distribution. IEEE Trans. Evol. Comput. 8(1), 1–13 (2004)
61.
go back to reference Alcalá-Fdez, J.; Sanchez, L.; Garcia, S.; del Jesus, M.J.; Ventura, S.; Garrell, J.M.; Otero, J.; Romero, C.; Bacardit, J.; Rivas, V.M.; et al.: Keel: a software tool to assess evolutionary algorithms for data mining problems. Soft Comput. 13(3), 307–318 (2009) Alcalá-Fdez, J.; Sanchez, L.; Garcia, S.; del Jesus, M.J.; Ventura, S.; Garrell, J.M.; Otero, J.; Romero, C.; Bacardit, J.; Rivas, V.M.; et al.: Keel: a software tool to assess evolutionary algorithms for data mining problems. Soft Comput. 13(3), 307–318 (2009)
62.
go back to reference Gehan, E.A.: A generalized Wilcoxon test for comparing arbitrarily singly-censored samples. Biometrika 52(1–2), 203–224 (1965)MathSciNetMATH Gehan, E.A.: A generalized Wilcoxon test for comparing arbitrarily singly-censored samples. Biometrika 52(1–2), 203–224 (1965)MathSciNetMATH
63.
go back to reference Hall, M.; Frank, E.; Holmes, G.; Pfahringer, B.; Reutemann, P.; Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10–18 (2009) Hall, M.; Frank, E.; Holmes, G.; Pfahringer, B.; Reutemann, P.; Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10–18 (2009)
Metadata
Title
A Modified Multi-objective Particle Swarm Optimizer-Based Lévy Flight: An Approach Toward Intrusion Detection in Internet of Things
Authors
Maria Habib
Ibrahim Aljarah
Hossam Faris
Publication date
31-03-2020
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering / Issue 8/2020
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-020-04476-9

Other articles of this Issue 8/2020

Arabian Journal for Science and Engineering 8/2020 Go to the issue

Research Article-Computer Engineering and Computer Science

A Blockchain-Based Solution to Control Power Losses in Pakistan

Premium Partners