Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

01.04.2021

Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks

verfasst von: Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

For a number of years, due to exponential increase in the demand for sustainable environment, suspicious activities have recently been identified as over-serious threats that are continually processing and growing. Identifying suspicious activities in the domain of cyber security is considered as a growing concern of research. To deal with suspicious threats, network requires traffic surveillance accompanied by beardown security policies. In order to handle data outflow, spoofing, disruption of service, energy exploiting, and insecure gateways range of attacks issues, the existing intrusion detection systems (IDSs) have observed to be less efficient as many of them are not able to detect anomalies with the change in the definition of the attack. To build a protected system against various cyber-attacks in computer networks, in this study, we introduce a multi-parallel adaptive evolutionary technique to utilize adaptation mechanism in the group of swarms for network intrusion detection. After that, simulated annealing is incorporated into multi-parallel adaptive grasshopper optimization technique to further improve the agent quality of individual after each iteration. It has revolutionized in the recent era for efficient threat detection with great performance in a certain time limit. The simulations are performed on three IDS datasets such as NSL-KDD, AWID-ATK-R, and NGIDS-DS. The proposed technique is compared with various existing techniques using different evaluation metrics. The comparative analysis demonstrates that the applicability of proposed technique concerning its merits outperforms the others algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House. Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House.
2.
Zurück zum Zitat Ghazy, R. A., El-Rabaie, E.-S.M., Dessouky, M. I., El-Fishawy, N. A., & Abd El-Samie, F. E. (2020). Feature selection ranking and subset-based techniques with different classifiers for intrusion detection. Wireless Personal Communications, 111(1), 375–393.CrossRef Ghazy, R. A., El-Rabaie, E.-S.M., Dessouky, M. I., El-Fishawy, N. A., & Abd El-Samie, F. E. (2020). Feature selection ranking and subset-based techniques with different classifiers for intrusion detection. Wireless Personal Communications, 111(1), 375–393.CrossRef
3.
Zurück zum Zitat Xie, Y., Feng, D., Hu, Y., Li, Y., Sample, S., & Long, D. (2018). Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments. IEEE Transactions on Dependable and Secure Computing, 17, 1283.CrossRef Xie, Y., Feng, D., Hu, Y., Li, Y., Sample, S., & Long, D. (2018). Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments. IEEE Transactions on Dependable and Secure Computing, 17, 1283.CrossRef
4.
Zurück zum Zitat Prasad, R., & Rohokale, V. (2020). Artificial intelligence and machine learning in cyber security. In Cyber Security: The Lifeline of Information and Communication Technology (pp. 231–247). Springer. Prasad, R., & Rohokale, V. (2020). Artificial intelligence and machine learning in cyber security. In Cyber Security: The Lifeline of Information and Communication Technology (pp. 231–247). Springer.
5.
Zurück zum Zitat Jing, X., Yan, Z., Jiang, X., & Pedrycz, W. (2019). Network traffic fusion and analysis against ddos flooding attacks with a novel reversible sketch. Information Fusion, 51, 100–113.CrossRef Jing, X., Yan, Z., Jiang, X., & Pedrycz, W. (2019). Network traffic fusion and analysis against ddos flooding attacks with a novel reversible sketch. Information Fusion, 51, 100–113.CrossRef
6.
Zurück zum Zitat Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.CrossRef Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.CrossRef
7.
Zurück zum Zitat Prasad, R., & Rohokale, V. (2020). Cyber security: The lifeline of information and communication Technology. Berlin: Springer.CrossRef Prasad, R., & Rohokale, V. (2020). Cyber security: The lifeline of information and communication Technology. Berlin: Springer.CrossRef
8.
Zurück zum Zitat Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103–117.CrossRef Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103–117.CrossRef
9.
Zurück zum Zitat Shunmugapriya, P., & Kanmani, S. (2017). A hybrid algorithm using ant and bee colony optimization for feature selection and classification (ac-abc hybrid). Swarm and Evolutionary Computation, 36, 27–36.CrossRef Shunmugapriya, P., & Kanmani, S. (2017). A hybrid algorithm using ant and bee colony optimization for feature selection and classification (ac-abc hybrid). Swarm and Evolutionary Computation, 36, 27–36.CrossRef
10.
Zurück zum Zitat Shukla, A. K. (2019). Building an effective approach toward intrusion detection using ensemble feature selection. International Journal of Information Security and Privacy (IJISP), 13(3), 31–47.MathSciNetCrossRef Shukla, A. K. (2019). Building an effective approach toward intrusion detection using ensemble feature selection. International Journal of Information Security and Privacy (IJISP), 13(3), 31–47.MathSciNetCrossRef
11.
Zurück zum Zitat Zawbaa, H. M., Emary, E., Grosan, C., & Snasel, V. (2018). Large-dimensionality small-instance set feature selection: A hybrid bio-inspired heuristic approach. Swarm and Evolutionary Computation, 42, 29–42.CrossRef Zawbaa, H. M., Emary, E., Grosan, C., & Snasel, V. (2018). Large-dimensionality small-instance set feature selection: A hybrid bio-inspired heuristic approach. Swarm and Evolutionary Computation, 42, 29–42.CrossRef
12.
Zurück zum Zitat Shukla, A. K., Pippal, S. K., & Chauhan, S. S. (2019). An empirical evaluation of teaching-learning-based optimization, genetic algorithm and particle swarm optimization. International Journal of Computers and Applications, 1, 15. Shukla, A. K., Pippal, S. K., & Chauhan, S. S. (2019). An empirical evaluation of teaching-learning-based optimization, genetic algorithm and particle swarm optimization. International Journal of Computers and Applications, 1, 15.
13.
Zurück zum Zitat Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N., & Hutchison, D. (2019). Hybrid self-organizing feature map (som) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences, 494, 247–277.CrossRef Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N., & Hutchison, D. (2019). Hybrid self-organizing feature map (som) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences, 494, 247–277.CrossRef
14.
Zurück zum Zitat Shukla, A. K., Pippal, S. K., Gupta, S., Ramachandra Reddy, B., & Tripathi, D. (2020). Knowledge discovery in medical and biological datasets by integration of relief-f and correlation feature selection techniques. Journal of Intelligent & Fuzzy Systems, 1, 1–12. Shukla, A. K., Pippal, S. K., Gupta, S., Ramachandra Reddy, B., & Tripathi, D. (2020). Knowledge discovery in medical and biological datasets by integration of relief-f and correlation feature selection techniques. Journal of Intelligent & Fuzzy Systems, 1, 1–12.
15.
Zurück zum Zitat Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Computer Networks, 176, 1072510725.CrossRef Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Computer Networks, 176, 1072510725.CrossRef
16.
Zurück zum Zitat Malik, A. J., & Khan, F. A. (2018). A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Computing, 21(1), 667–680.CrossRef Malik, A. J., & Khan, F. A. (2018). A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Computing, 21(1), 667–680.CrossRef
17.
Zurück zum Zitat Saremi, S., Mirjalili, S., & Lewis, A. (2017). Grasshopper optimisation algorithm: Theory and application. Advances in Engineering Software, 105, 30–47.CrossRef Saremi, S., Mirjalili, S., & Lewis, A. (2017). Grasshopper optimisation algorithm: Theory and application. Advances in Engineering Software, 105, 30–47.CrossRef
18.
Zurück zum Zitat Mirjalili, S. Z., Mirjalili, S., Saremi, S., Faris, H., & Aljarah, I. (2018). Grasshopper optimization algorithm for multi-objective optimization problems. Applied Intelligence, 48(4), 805–820.CrossRef Mirjalili, S. Z., Mirjalili, S., Saremi, S., Faris, H., & Aljarah, I. (2018). Grasshopper optimization algorithm for multi-objective optimization problems. Applied Intelligence, 48(4), 805–820.CrossRef
19.
Zurück zum Zitat Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed dos attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 43, 1–11. Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed dos attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 43, 1–11.
20.
Zurück zum Zitat Alazzam, H., Sharieh, A., & Sabri, K. E. (2020). A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Systems with Applications, 148, 113249.CrossRef Alazzam, H., Sharieh, A., & Sabri, K. E. (2020). A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Systems with Applications, 148, 113249.CrossRef
21.
Zurück zum Zitat Xiong, H., Qiu, B., & Liu, J. (2020). An improved multi-swarm particle swarm optimizer for optimizing the electric field distribution of multichannel transcranial magnetic stimulation. Artificial Intelligence in Medicine, 104, 101790.CrossRef Xiong, H., Qiu, B., & Liu, J. (2020). An improved multi-swarm particle swarm optimizer for optimizing the electric field distribution of multichannel transcranial magnetic stimulation. Artificial Intelligence in Medicine, 104, 101790.CrossRef
22.
Zurück zum Zitat Jamali, S., & Shaker, G. (2012). Pso-sfdd: Defense against syn flooding dos attacks by employing pso algorithm. Computers & Mathematics with Applications, 63(1), 214–221.MATHCrossRef Jamali, S., & Shaker, G. (2012). Pso-sfdd: Defense against syn flooding dos attacks by employing pso algorithm. Computers & Mathematics with Applications, 63(1), 214–221.MATHCrossRef
23.
Zurück zum Zitat Arora, S., & Anand, P. (2018). Chaotic grasshopper optimization algorithm for global optimization. Neural Computing and Applications, 31, 1–21. Arora, S., & Anand, P. (2018). Chaotic grasshopper optimization algorithm for global optimization. Neural Computing and Applications, 31, 1–21.
24.
Zurück zum Zitat Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, 76, 1–38.CrossRef Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, 76, 1–38.CrossRef
25.
Zurück zum Zitat Chen, H., Li, S., Heidari, A. A., Wang, P., Li, J., Yang, Y., Wang, M., & Huang, C. (2020). Efficient multi-population outpost fruit fly-driven optimizers: Framework and advances in support vector machines. Expert Systems with Applications, 142, 112999. Chen, H., Li, S., Heidari, A. A., Wang, P., Li, J., Yang, Y., Wang, M., & Huang, C. (2020). Efficient multi-population outpost fruit fly-driven optimizers: Framework and advances in support vector machines. Expert Systems with Applications, 142, 112999.
26.
Zurück zum Zitat Wang, M., & Chen, H. (2020). Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis. Applied Soft Computing, 88, 105946.CrossRef Wang, M., & Chen, H. (2020). Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis. Applied Soft Computing, 88, 105946.CrossRef
27.
Zurück zum Zitat de Campos Jr, A., Pozo, A. T., & Duarte, E. P., Jr. (2019). Parallel multi-swarm pso strategies for solving many objective optimization problems. Journal of Parallel and Distributed Computing, 126, 13–33.CrossRef de Campos Jr, A., Pozo, A. T., & Duarte, E. P., Jr. (2019). Parallel multi-swarm pso strategies for solving many objective optimization problems. Journal of Parallel and Distributed Computing, 126, 13–33.CrossRef
28.
Zurück zum Zitat Chen, H., Heidari, A. A., Zhao, X., Zhang, L., & Chen, H. (2020). Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies. Expert Systems with Applications, 144, 113113.CrossRef Chen, H., Heidari, A. A., Zhao, X., Zhang, L., & Chen, H. (2020). Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies. Expert Systems with Applications, 144, 113113.CrossRef
29.
Zurück zum Zitat Zhang, Y., Liu, X., Bao, F., Chi, J., Zhang, C., & Liu, P. (2020). Particle swarm optimization with adaptive learning strategy. Knowledge-Based Systems, 196, 105789.CrossRef Zhang, Y., Liu, X., Bao, F., Chi, J., Zhang, C., & Liu, P. (2020). Particle swarm optimization with adaptive learning strategy. Knowledge-Based Systems, 196, 105789.CrossRef
30.
Zurück zum Zitat Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S. H., Hassan, M. M., Fortino, G., & Choo, K.-K.R. (2019). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in wsns. Information Sciences, 497, 77–90.CrossRef Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S. H., Hassan, M. M., Fortino, G., & Choo, K.-K.R. (2019). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in wsns. Information Sciences, 497, 77–90.CrossRef
31.
Zurück zum Zitat Ambusaidi, M. A., He, X., & Nanda, P. (2015). Unsupervised feature selection method for intrusion detection system. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 295–301). IEEE. Ambusaidi, M. A., He, X., & Nanda, P. (2015). Unsupervised feature selection method for intrusion detection system. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 295–301). IEEE.
32.
Zurück zum Zitat Raman, M. G., Somu, N., Kirthivasan, K., Liscano, R., & Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems, 134, 1–12.CrossRef Raman, M. G., Somu, N., Kirthivasan, K., Liscano, R., & Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems, 134, 1–12.CrossRef
33.
Zurück zum Zitat Hoang, T.-H., et al. (2018). Detect wi-fi network attacks using parallel genetic programming. In 2018 10th International Conference on Knowledge and Systems Engineering (KSE) (pp. 370–375). IEEE. Hoang, T.-H., et al. (2018). Detect wi-fi network attacks using parallel genetic programming. In 2018 10th International Conference on Knowledge and Systems Engineering (KSE) (pp. 370–375). IEEE.
34.
Zurück zum Zitat Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.CrossRef Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.CrossRef
35.
Zurück zum Zitat Haider, W., Moustafa, N., Keshk, M., Fernandez, A., Choo, K.-K.R., & Wahab, A. (2020). Fgmc-hads: Fuzzy gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. Computers & Security, 96, 101906.CrossRef Haider, W., Moustafa, N., Keshk, M., Fernandez, A., Choo, K.-K.R., & Wahab, A. (2020). Fgmc-hads: Fuzzy gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. Computers & Security, 96, 101906.CrossRef
36.
Zurück zum Zitat Lv, L., Wang, W., Zhang, Z., & Liu, X. (2020). A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowledge-Based Systems, 195, 105648.CrossRef Lv, L., Wang, W., Zhang, Z., & Liu, X. (2020). A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowledge-Based Systems, 195, 105648.CrossRef
37.
Zurück zum Zitat Rizzi, A., Granato, G., & Baiocchi, A. (2020). Frame-by-frame wi-fi attack detection algorithm with scalable and modular machine-learning design. Applied Soft Computing, 91, 106188.CrossRef Rizzi, A., Granato, G., & Baiocchi, A. (2020). Frame-by-frame wi-fi attack detection algorithm with scalable and modular machine-learning design. Applied Soft Computing, 91, 106188.CrossRef
38.
Zurück zum Zitat Zakeri, A., & Hokmabadi, A. (2019). Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Systems with Applications, 119, 61–72.CrossRef Zakeri, A., & Hokmabadi, A. (2019). Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Systems with Applications, 119, 61–72.CrossRef
39.
Zurück zum Zitat Mafarja, M., Aljarah, I., Faris, H., Hammouri, A. I., AlaaM, A.-Z., & Mirjalili, S. (2019). Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Systems with Applications, 117, 267–286.CrossRef Mafarja, M., Aljarah, I., Faris, H., Hammouri, A. I., AlaaM, A.-Z., & Mirjalili, S. (2019). Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Systems with Applications, 117, 267–286.CrossRef
40.
Zurück zum Zitat Fathy, A. (2018). Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded pv array. Solar Energy, 171, 638–651.CrossRef Fathy, A. (2018). Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded pv array. Solar Energy, 171, 638–651.CrossRef
41.
Zurück zum Zitat Cheng, C., Tay, W. P., & Huang, G.-B. (2012). Extreme learning machines for intrusion detection. In The 2012 International joint conference on neural networks (IJCNN) (pp. 1–8). IEEE. Cheng, C., Tay, W. P., & Huang, G.-B. (2012). Extreme learning machines for intrusion detection. In The 2012 International joint conference on neural networks (IJCNN) (pp. 1–8). IEEE.
42.
Zurück zum Zitat Li, C., & Wu, T. (2011). Adaptive fuzzy approach to function approximation with pso and rlse. Expert Systems with Applications, 38, 13266–13273.CrossRef Li, C., & Wu, T. (2011). Adaptive fuzzy approach to function approximation with pso and rlse. Expert Systems with Applications, 38, 13266–13273.CrossRef
43.
Zurück zum Zitat Xia, X., Gui, L., & Zhan, Z.-H. (2018). A multi-swarm particle swarm optimization algorithm based on dynamical topology and purposeful detecting. Applied Soft Computing, 67, 126–140.CrossRef Xia, X., Gui, L., & Zhan, Z.-H. (2018). A multi-swarm particle swarm optimization algorithm based on dynamical topology and purposeful detecting. Applied Soft Computing, 67, 126–140.CrossRef
44.
Zurück zum Zitat Karami, A. (2018). An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Systems with Applications, 108, 36–60.CrossRef Karami, A. (2018). An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Systems with Applications, 108, 36–60.CrossRef
45.
Zurück zum Zitat Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1–6). IEEE. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1–6). IEEE.
46.
Zurück zum Zitat Wang, H., Gu, J., & Wang, S. (2017). An effective intrusion detection framework based on svm with feature augmentation. Knowledge-Based Systems, 136, 130–139.CrossRef Wang, H., Gu, J., & Wang, S. (2017). An effective intrusion detection framework based on svm with feature augmentation. Knowledge-Based Systems, 136, 130–139.CrossRef
47.
Zurück zum Zitat Abdulhammed, R., Faezipour, M., Abuzneid, A., & Alessa, A. (2018). Enhancing wireless intrusion detection using machine learning classification with reduced attribute sets. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 524–529). IEEE. Abdulhammed, R., Faezipour, M., Abuzneid, A., & Alessa, A. (2018). Enhancing wireless intrusion detection using machine learning classification with reduced attribute sets. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 524–529). IEEE.
48.
Zurück zum Zitat Haider, W., Hu, J., Slay, J., Turnbull, B. P., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of Network and Computer Applications, 87, 185–192.CrossRef Haider, W., Hu, J., Slay, J., Turnbull, B. P., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of Network and Computer Applications, 87, 185–192.CrossRef
49.
Zurück zum Zitat Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). Kdd cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41–51.CrossRef Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). Kdd cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41–51.CrossRef
50.
Zurück zum Zitat Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.CrossRef Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.CrossRef
51.
Zurück zum Zitat Garg, S., Kaur, K., Batra, S., Aujla, G. S., Morgan, G., Kumar, N., Zomaya, A. Y., & Ranjan R. (2020). En-abc: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. Journal of Parallel and Distributed Computing, 135, 219–233. Garg, S., Kaur, K., Batra, S., Aujla, G. S., Morgan, G., Kumar, N., Zomaya, A. Y., & Ranjan R. (2020). En-abc: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. Journal of Parallel and Distributed Computing, 135, 219–233.
52.
Zurück zum Zitat Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science, 25, 152–160.CrossRef Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science, 25, 152–160.CrossRef
53.
Zurück zum Zitat Jyothsna, V., & Prasad, V. R. (2016). Fcaais: Anomaly based network intrusion detection through feature correlation analysis and association impact scale. ICT Express, 2(3), 103–116.CrossRef Jyothsna, V., & Prasad, V. R. (2016). Fcaais: Anomaly based network intrusion detection through feature correlation analysis and association impact scale. ICT Express, 2(3), 103–116.CrossRef
54.
Zurück zum Zitat Mazini, M., Shirazi, B., & Mahdavi, I. (2018). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. Journal of King Saud University-Computer and Information Sciences, 31, 541.CrossRef Mazini, M., Shirazi, B., & Mahdavi, I. (2018). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. Journal of King Saud University-Computer and Information Sciences, 31, 541.CrossRef
55.
Zurück zum Zitat Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700.MathSciNetCrossRef Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700.MathSciNetCrossRef
56.
Zurück zum Zitat Nahiyan, K., Kaiser, S., Ferens, K., & McLeod, R. (2017). A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In Proceedings of the 2017 International Conference on Applied Cognitive Computing (ACC’17). Nahiyan, K., Kaiser, S., Ferens, K., & McLeod, R. (2017). A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In Proceedings of the 2017 International Conference on Applied Cognitive Computing (ACC’17).
57.
Zurück zum Zitat Vijayakumar, D. S., & Ganapathy, S. (2018). Machine learning approach to combat false alarms in wireless intrusion detection system. Computer and Information Science, 11(3), 67–81.CrossRef Vijayakumar, D. S., & Ganapathy, S. (2018). Machine learning approach to combat false alarms in wireless intrusion detection system. Computer and Information Science, 11(3), 67–81.CrossRef
58.
Zurück zum Zitat Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752.CrossRef Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752.CrossRef
59.
Zurück zum Zitat Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for iot wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581.CrossRef Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for iot wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581.CrossRef
60.
Zurück zum Zitat Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in 80.211 networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184–208.CrossRef Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in 80.211 networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184–208.CrossRef
61.
Zurück zum Zitat Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks, 174, 107247.CrossRef Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks, 174, 107247.CrossRef
62.
Zurück zum Zitat Haider, W., Hu, J., Xie, Y., Yu, X., & Wu, Q. (2017). Detecting anomalous behavior in cloud servers by nested arc hidden semi-markov model with state summarization. IEEE Transactions on Big Data, 5, 3. Haider, W., Hu, J., Xie, Y., Yu, X., & Wu, Q. (2017). Detecting anomalous behavior in cloud servers by nested arc hidden semi-markov model with state summarization. IEEE Transactions on Big Data, 5, 3.
63.
Zurück zum Zitat Haider, W., Hu, J., & Moustafa, N. (2017). Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning. In International Conference on Mobile Networks and Management (pp. 137–149). Springer. Haider, W., Hu, J., & Moustafa, N. (2017). Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning. In International Conference on Mobile Networks and Management (pp. 137–149). Springer.
64.
Zurück zum Zitat Tran, N. N., Sarker, R., & Hu, J. (2017). An approach for host-based intrusion detection system design using convolutional neural network. In International Conference on Mobile Networks and Management (pp. 116–126). Springer. Tran, N. N., Sarker, R., & Hu, J. (2017). An approach for host-based intrusion detection system design using convolutional neural network. In International Conference on Mobile Networks and Management (pp. 116–126). Springer.
Metadaten
Titel
Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks
verfasst von
Shubhra Dwivedi
Manu Vardhan
Sarsij Tripathi
Publikationsdatum
01.04.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08368-5

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe

Neuer Inhalt