Skip to main content
Erschienen in: The Journal of Supercomputing 11/2020

20.01.2020

Incorporating evolutionary computation for securing wireless network against cyberthreats

verfasst von: Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi

Erschienen in: The Journal of Supercomputing | Ausgabe 11/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the rapid growth of internet services, the demand for protection and security of the network against sophisticated attacks is continuously increasing. Nowadays, in network security, an intrusion detection system (IDS) plays an important role to detect intrusive activity. With the purpose of reducing the search dimensionality and enhancing classification performance of IDS model, in the literature several hybrid evolutionary algorithms have been investigated to tackle anomaly detection problems, but they have few drawbacks such as poor diversity, massive false negative rate, and stagnation. To resolve these limitations, in this study, we introduce a new hybrid evolutionary algorithm combining the techniques of grasshopper optimization algorithm (GOA) and simulated annealing (SA), called GOSA for IDS that extracts the most noteworthy features and eliminates irrelevant ones from the original IDS datasets. In the proposed method, SA is integrated into GOA, while utilizing it to increase the solution quality after each iteration of GOA. Support vector machine is used as a fitness function in the proposed method to select relevant features which can help to classify attacks accurately. The performance of the proposed method is evaluated on two IDS datasets such as NSL-KDD and UNSW-NB15. From experimental results, we observe that the proposed method outperforms existing state-of-the-art methods and attains high detection rate as 99.86%, an accuracy as 99.89%, and low false alarm rate as 0.009 in NSL-KDD and high detection rate as 98.85%, an accuracy as 98.96%, and low false alarm rate as 0.084 in UNSW-NB15.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Balakrishnan V, Khan S, Fernandez T, Arabnia HR (2019) Cyberbullying detection on twitter using big five and dark triad features. Person Individ Differ 141:252–257 Balakrishnan V, Khan S, Fernandez T, Arabnia HR (2019) Cyberbullying detection on twitter using big five and dark triad features. Person Individ Differ 141:252–257
2.
Zurück zum Zitat Kim K, Kim I, Lim J (2017) National cyber security enhancement scheme for intelligent surveillance capacity with public iot environment. J Supercomput 73(3):1140–1151 Kim K, Kim I, Lim J (2017) National cyber security enhancement scheme for intelligent surveillance capacity with public iot environment. J Supercomput 73(3):1140–1151
3.
Zurück zum Zitat Khosravi MR, Basri H, Rostami H, Samadi S (2018) Distributed random cooperation for vbf-based routing in high-speed dense underwater acoustic sensor networks. J Supercomput 74(11):6184–6200 Khosravi MR, Basri H, Rostami H, Samadi S (2018) Distributed random cooperation for vbf-based routing in high-speed dense underwater acoustic sensor networks. J Supercomput 74(11):6184–6200
5.
Zurück zum Zitat Zhang J, Gardner R, Vukotic I (2019) Anomaly detection in wide area network meshes using two machine learning algorithms. Future Gen Comput Syst 93:418–426 Zhang J, Gardner R, Vukotic I (2019) Anomaly detection in wide area network meshes using two machine learning algorithms. Future Gen Comput Syst 93:418–426
6.
Zurück zum Zitat Spafford EH, Zamboni D (2000) Intrusion detection using autonomous agents. Comput Netw 34(4):547–570 Spafford EH, Zamboni D (2000) Intrusion detection using autonomous agents. Comput Netw 34(4):547–570
7.
Zurück zum Zitat Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199MathSciNet Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199MathSciNet
8.
Zurück zum Zitat Khammassi C, Krichen S (2017) A ga-lr wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277 Khammassi C, Krichen S (2017) A ga-lr wrapper approach for feature selection in network intrusion detection. Comput Secur 70:255–277
9.
Zurück zum Zitat Ambusaidi MA, He X, Nanda P (2015) Unsupervised feature selection method for intrusion detection system. In: IEEE Trustcom/BigDataSE/ISPA, vol 1. IEEE, pp 295–301 Ambusaidi MA, He X, Nanda P (2015) Unsupervised feature selection method for intrusion detection system. In: IEEE Trustcom/BigDataSE/ISPA, vol 1. IEEE, pp 295–301
10.
Zurück zum Zitat Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35 Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1–35
11.
Zurück zum Zitat Aburomman AA, Reaz MBI (2017) A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput Secur 65:135–152 Aburomman AA, Reaz MBI (2017) A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput Secur 65:135–152
12.
Zurück zum Zitat Wang W, He Y, Liu J, Gombault S (2015) Constructing important features from massive network traffic for lightweight intrusion detection. IET Inf Secur 9(6):374–379 Wang W, He Y, Liu J, Gombault S (2015) Constructing important features from massive network traffic for lightweight intrusion detection. IET Inf Secur 9(6):374–379
13.
Zurück zum Zitat Shukla AK, Singh P, Vardhan M (2018) Neighbour teaching learning based optimization for global optimization problems. J Intell Fuzzy Syst 34(3):1583–1594 Shukla AK, Singh P, Vardhan M (2018) Neighbour teaching learning based optimization for global optimization problems. J Intell Fuzzy Syst 34(3):1583–1594
14.
Zurück zum Zitat Črepinšek M, Liu S-H, Mernik M (2013) Exploration and exploitation in evolutionary algorithms: a survey. ACM Comput Surv (CSUR) 45(3):35MATH Črepinšek M, Liu S-H, Mernik M (2013) Exploration and exploitation in evolutionary algorithms: a survey. ACM Comput Surv (CSUR) 45(3):35MATH
15.
Zurück zum Zitat Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53–62 Gu J, Wang L, Wang H, Wang S (2019) A novel approach to intrusion detection using SVM ensemble with feature augmentation. Comput Secur 86:53–62
16.
Zurück zum Zitat Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37–50 Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection. Comput Netw 136:37–50
17.
Zurück zum Zitat Talbi E-G (2009) Metaheuristics: from design to implementation, vol 74. Wiley, New YorkMATH Talbi E-G (2009) Metaheuristics: from design to implementation, vol 74. Wiley, New YorkMATH
18.
Zurück zum Zitat Shukla AK (2019) Building an effective approach toward intrusion detection using ensemble feature selection. Int J Inf Secur Priv 13(3):31–47 Shukla AK (2019) Building an effective approach toward intrusion detection using ensemble feature selection. Int J Inf Secur Priv 13(3):31–47
19.
Zurück zum Zitat Modi CN, Acha K (2017) Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J Supercomput 73(3):1192–1234 Modi CN, Acha K (2017) Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J Supercomput 73(3):1192–1234
20.
Zurück zum Zitat Luo H, Chen Z, Li J, Vasilakos AV (2017) Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans Inf Forensics Secur 12(8):1801–1815 Luo H, Chen Z, Li J, Vasilakos AV (2017) Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans Inf Forensics Secur 12(8):1801–1815
21.
Zurück zum Zitat Javidrad F, Nazari M, Javidrad H (2018) Optimum stacking sequence design of laminates using a hybrid PSO-SA method. Compos Struct 185:607–618 Javidrad F, Nazari M, Javidrad H (2018) Optimum stacking sequence design of laminates using a hybrid PSO-SA method. Compos Struct 185:607–618
22.
Zurück zum Zitat Bagherlou H, Ghaffari A (2018) A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks. J Supercomput 74(6):2528–2552 Bagherlou H, Ghaffari A (2018) A routing protocol for vehicular ad hoc networks using simulated annealing algorithm and neural networks. J Supercomput 74(6):2528–2552
23.
Zurück zum Zitat Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820 Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820
24.
Zurück zum Zitat Pervez MS, Farid DM (2014) Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing svms. In: The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014). IEEE, pp 1–6 Pervez MS, Farid DM (2014) Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing svms. In: The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014). IEEE, pp 1–6
25.
Zurück zum Zitat Arora S, Anand P (2019) Chaotic grasshopper optimization algorithm for global optimization. Neural Comput Appl 31(8):4385–4405 Arora S, Anand P (2019) Chaotic grasshopper optimization algorithm for global optimization. Neural Comput Appl 31(8):4385–4405
26.
Zurück zum Zitat Mafarja M, Aljarah I, Faris H, Hammouri AI, AlaM A-Z, Mirjalili S (2019) Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286 Mafarja M, Aljarah I, Faris H, Hammouri AI, AlaM A-Z, Mirjalili S (2019) Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Syst Appl 117:267–286
27.
Zurück zum Zitat Medjahed SA, Saadi TA, Benyettou A, Ouali M (2017) Kernel-based learning and feature selection analysis for cancer diagnosis. Appl Soft Comput 51:39–48 Medjahed SA, Saadi TA, Benyettou A, Ouali M (2017) Kernel-based learning and feature selection analysis for cancer diagnosis. Appl Soft Comput 51:39–48
28.
Zurück zum Zitat Javidrad F, Nazari M (2017) A new hybrid particle swarm and simulated annealing stochastic optimization method. Appl Soft Comput 60:634–654 Javidrad F, Nazari M (2017) A new hybrid particle swarm and simulated annealing stochastic optimization method. Appl Soft Comput 60:634–654
29.
Zurück zum Zitat Beigvand SD, Abdi H, La Scala M (2017) Hybrid gravitational search algorithm-particle swarm optimization with time varying acceleration coefficients for large scale chped problem. Energy 126:841–853 Beigvand SD, Abdi H, La Scala M (2017) Hybrid gravitational search algorithm-particle swarm optimization with time varying acceleration coefficients for large scale chped problem. Energy 126:841–853
30.
Zurück zum Zitat Rodriguez FJ, Garcia-Martinez C, Lozano M (2012) Hybrid metaheuristics based on evolutionary algorithms and simulated annealing: taxonomy, comparison, and synergy test. IEEE Trans Evol Comput 16(6):787–800 Rodriguez FJ, Garcia-Martinez C, Lozano M (2012) Hybrid metaheuristics based on evolutionary algorithms and simulated annealing: taxonomy, comparison, and synergy test. IEEE Trans Evol Comput 16(6):787–800
31.
Zurück zum Zitat Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680MathSciNetMATH Kirkpatrick S, Gelatt CD, Vecchi MP (1983) Optimization by simulated annealing. Science 220(4598):671–680MathSciNetMATH
32.
Zurück zum Zitat Hamamoto AH, Carvalho LF, Sampaio LDH, Abrão T, Proença ML Jr (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402 Hamamoto AH, Carvalho LF, Sampaio LDH, Abrão T, Proença ML Jr (2018) Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst Appl 92:390–402
33.
Zurück zum Zitat Sinha A, Jana PK (2018) A hybrid mapreduce-based \(k\)-means clustering using genetic algorithm for distributed datasets. J Supercomput 74(4):1562–1579 Sinha A, Jana PK (2018) A hybrid mapreduce-based \(k\)-means clustering using genetic algorithm for distributed datasets. J Supercomput 74(4):1562–1579
34.
Zurück zum Zitat Sadiq AS, Alkazemi B, Mirjalili S, Ahmed N, Khan S, Ali I, Pathan A-SK, Ghafoor KZ (2018) An efficient ids using hybrid magnetic swarm optimization in wanets. IEEE Access 6:29 041–29 053 Sadiq AS, Alkazemi B, Mirjalili S, Ahmed N, Khan S, Ali I, Pathan A-SK, Ghafoor KZ (2018) An efficient ids using hybrid magnetic swarm optimization in wanets. IEEE Access 6:29 041–29 053
35.
Zurück zum Zitat Tsang C-H, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn 40(9):2373–2391MATH Tsang C-H, Kwong S, Wang H (2007) Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recogn 40(9):2373–2391MATH
36.
Zurück zum Zitat Shahreza ML, Moazzami D, Moshiri B, Delavar M (2011) Anomaly detection using a self-organizing map and particle swarm optimization. Sci Iran 18(6):1460–1468 Shahreza ML, Moazzami D, Moshiri B, Delavar M (2011) Anomaly detection using a self-organizing map and particle swarm optimization. Sci Iran 18(6):1460–1468
37.
Zurück zum Zitat Zaman S, Karray F (2009) Lightweight ids based on features selection and ids classification scheme. In: 2009 International Conference on Computational Science and Engineering, vol 3. IEEE, pp 365–370 Zaman S, Karray F (2009) Lightweight ids based on features selection and ids classification scheme. In: 2009 International Conference on Computational Science and Engineering, vol 3. IEEE, pp 365–370
38.
Zurück zum Zitat Buchtala O, Klimek M, Sick B (2005) Evolutionary optimization of radial basis function classifiers for data mining applications. IEEE Trans Syst Man Cybern Part B (Cybernetics) 35(5):928–947 Buchtala O, Klimek M, Sick B (2005) Evolutionary optimization of radial basis function classifiers for data mining applications. IEEE Trans Syst Man Cybern Part B (Cybernetics) 35(5):928–947
39.
Zurück zum Zitat Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184 Kuang F, Xu W, Zhang S (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178–184
40.
Zurück zum Zitat Vidal JM, Orozco ALS, Villalba LJG (2018) Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evolut Comput 38:94–108 Vidal JM, Orozco ALS, Villalba LJG (2018) Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evolut Comput 38:94–108
41.
Zurück zum Zitat Moon D, Im H, Kim I, Park JH (2017) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing apt attacks. J Supercomput 73(7):2881–2895 Moon D, Im H, Kim I, Park JH (2017) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing apt attacks. J Supercomput 73(7):2881–2895
42.
Zurück zum Zitat Karami A, Guerrero-Zapata M (2015) A hybrid multiobjective RBF-PSO method for mitigating DOS attacks in named data networking. Neurocomputing 151:1262–1282 Karami A, Guerrero-Zapata M (2015) A hybrid multiobjective RBF-PSO method for mitigating DOS attacks in named data networking. Neurocomputing 151:1262–1282
43.
Zurück zum Zitat Zakeri A, Hokmabadi A (2019) Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Syst Appl 119:61–72 Zakeri A, Hokmabadi A (2019) Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Syst Appl 119:61–72
44.
Zurück zum Zitat Fathy A (2018) Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded PV array. Sol Energy 171:638–651 Fathy A (2018) Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded PV array. Sol Energy 171:638–651
45.
Zurück zum Zitat Ewees AA, Elaziz MA, Houssein EH (2018) Improved grasshopper optimization algorithm using opposition-based learning. Expert Syst Appl 112:156–172 Ewees AA, Elaziz MA, Houssein EH (2018) Improved grasshopper optimization algorithm using opposition-based learning. Expert Syst Appl 112:156–172
46.
Zurück zum Zitat Daneshmand SV, Heydari H (2016) A diversified multiobjective simulated annealing and genetic algorithm for optimizing a three-phase hts transformer. IEEE Trans Appl Supercond 26(2):1–10 Daneshmand SV, Heydari H (2016) A diversified multiobjective simulated annealing and genetic algorithm for optimizing a three-phase hts transformer. IEEE Trans Appl Supercond 26(2):1–10
47.
Zurück zum Zitat Mafarja MM, Mirjalili S (2017) Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 260:302–312 Mafarja MM, Mirjalili S (2017) Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 260:302–312
48.
Zurück zum Zitat Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297MATH Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273–297MATH
49.
Zurück zum Zitat Alijla BO, Lim CP, Wong L-P, Khader AT, Al-Betar MA (2018) An ensemble of intelligent water drop algorithm for feature selection optimization problem. Appl Soft Comput 65:531–541 Alijla BO, Lim CP, Wong L-P, Khader AT, Al-Betar MA (2018) An ensemble of intelligent water drop algorithm for feature selection optimization problem. Appl Soft Comput 65:531–541
50.
Zurück zum Zitat Ting T, Yang XS, Cheng S, Huang K (2015) Hybrid metaheuristic algorithms: past, present, and future. In: Yang XS (ed) Recent advances in swarm intelligence and evolutionary computation. Studies in computational intelligence, vol 585. Springer, Cham, pp 71–83 Ting T, Yang XS, Cheng S, Huang K (2015) Hybrid metaheuristic algorithms: past, present, and future. In: Yang XS (ed) Recent advances in swarm intelligence and evolutionary computation. Studies in computational intelligence, vol 585. Springer, Cham, pp 71–83
51.
Zurück zum Zitat Maudes J, Rodríguez JJ, García-Osorio C (2007) Cascading for nominal data. In: Haindl M, Kittler J, Roli F (eds) Multiple Classifier Systems. MCS 2007. Lecture notes in computer science, vol 4472. Springer, Berlin, Heidelberg, pp 231–240 Maudes J, Rodríguez JJ, García-Osorio C (2007) Cascading for nominal data. In: Haindl M, Kittler J, Roli F (eds) Multiple Classifier Systems. MCS 2007. Lecture notes in computer science, vol 4472. Springer, Berlin, Heidelberg, pp 231–240
52.
Zurück zum Zitat Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6 Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD cup 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications. IEEE, pp 1–6
53.
Zurück zum Zitat Mazini M, Shirazi B, Mahdavi I (2019) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. J King Saud Univ Comput Inf Sci 31(4):541–553 Mazini M, Shirazi B, Mahdavi I (2019) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. J King Saud Univ Comput Inf Sci 31(4):541–553
55.
Zurück zum Zitat Chang C-C, Lin C-J (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):27 Chang C-C, Lin C-J (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol 2(3):27
56.
Zurück zum Zitat Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160 Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160
57.
Zurück zum Zitat Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on svm with feature augmentation. Knowl Based Syst 136:130–139 Wang H, Gu J, Wang S (2017) An effective intrusion detection framework based on svm with feature augmentation. Knowl Based Syst 136:130–139
58.
Zurück zum Zitat Abd Eldayem M (2014) A proposed http service based ids. Egypt Inform J 15:03 Abd Eldayem M (2014) A proposed http service based ids. Egypt Inform J 15:03
59.
Zurück zum Zitat Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2019) Shallow neural network with kernel approximation for prediction problems in highly demanding data networks. Expert Syst Appl 124:196–208 Lopez-Martin M, Carro B, Sanchez-Esguevillas A, Lloret J (2019) Shallow neural network with kernel approximation for prediction problems in highly demanding data networks. Expert Syst Appl 124:196–208
60.
Zurück zum Zitat Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700MathSciNet Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690–1700MathSciNet
61.
Zurück zum Zitat Bhuvaneswari Amma NG, Selvakumar S (2019) Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing 340:294–308 Bhuvaneswari Amma NG, Selvakumar S (2019) Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing 340:294–308
62.
Zurück zum Zitat Salo F, Nassif AB, Essex A (2019) Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput Netw 148:164–175 Salo F, Nassif AB, Essex A (2019) Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput Netw 148:164–175
63.
Zurück zum Zitat Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. In: Pattnaik P, Rautaray S, Das H, Nayak J (eds) Progress in computing, analytics and networking. Advances in intelligent systems and computing, vol 710. Springer, Singapore, pp 125–135 Moustafa N, Creech G, Slay J (2018) Anomaly detection system using beta mixture models and outlier detection. In: Pattnaik P, Rautaray S, Das H, Nayak J (eds) Progress in computing, analytics and networking. Advances in intelligent systems and computing, vol 710. Springer, Singapore, pp 125–135
64.
Zurück zum Zitat Karami A, Guerrero Zapata M (2014) Mining and visualizing uncertain data objects and named data networking traffics by fuzzy self-organizing map. In: Proceedings of the Second International Workshop on Artificial Intelligence and Cognition (AIC 2014): Torino, Italy, November 26–27, 2014. CEUR-WS. org, pp 156–163 Karami A, Guerrero Zapata M (2014) Mining and visualizing uncertain data objects and named data networking traffics by fuzzy self-organizing map. In: Proceedings of the Second International Workshop on Artificial Intelligence and Cognition (AIC 2014): Torino, Italy, November 26–27, 2014. CEUR-WS. org, pp 156–163
65.
Zurück zum Zitat Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: statistical decision-making using finite dirichlet mixture models. In: Palomares Carrascosa I, Kalutarage H, Huang Y (eds) Data analytics and decision support for cybersecurity. Data Analytics, Springer, Cham, pp 127–156 Moustafa N, Creech G, Slay J (2017) Big data analytics for intrusion detection system: statistical decision-making using finite dirichlet mixture models. In: Palomares Carrascosa I, Kalutarage H, Huang Y (eds) Data analytics and decision support for cybersecurity. Data Analytics, Springer, Cham, pp 127–156
Metadaten
Titel
Incorporating evolutionary computation for securing wireless network against cyberthreats
verfasst von
Shubhra Dwivedi
Manu Vardhan
Sarsij Tripathi
Publikationsdatum
20.01.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 11/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03161-w

Weitere Artikel der Ausgabe 11/2020

The Journal of Supercomputing 11/2020 Zur Ausgabe