Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity
Abstract
:1. Introduction
- The proposed modified firefly algorithm supports IDS for the efficient detection and shortlisting of intruders for the early detection of suspicious nodes. It achieves 84% reduction in the number of nodes that requires observation to detect suspicious activity or an attack; 19 out of 50 nodes were flagged suspicious in normal IDS before attack detection, whereas only 3 out of 50 nodes were flagged in the proposed algorithm.
- A novel health function is proposed to consider more realistic parameters for network monitoring. Whereas the earlier works only focused on feature selection and optimization of the prepossessing of network data, the proposed health function helps in the early identification of suspicious nodes. The proposed health function calculates three important network parameters (normalized ideal throughput, end-to-end delay, and packet delivery ratio) and attacks throughput with a negligible overhead; the introduction of the health function increases the average run time by only 2% from 5.30 to 5.403 s.
2. Related Work
3. Materials and Methods
3.1. Firefly-Inspired IDS Optimization
3.2. Basic Firefly Algorithm
3.3. Health Function
3.4. Modified Firefly Algorithm
Algorithm 1: One cycle of firefly-inspired IDS scan |
4. Result
4.1. Experimental Setup
4.2. Detection of Suspicious Node(s)
4.2.1. Test Case #1 [Identification of Malicious Nodes]
4.2.2. Test Case #2 [Isolating Cluster 4]
4.2.3. Importance of Health Function
5. Discussion
- We proposed improving the host-based intrusion detection system (HIDS) using a nature-inspired algorithm.
- Our modified firefly algorithm will use input from host behaviors and identify the suspicious host in the network.
- A HIDS can use the proposed solution as a triggering step to improve the detection and computation performance of the detection system.
- The experimental result shows that the proposed solution achieves a notably low computation footprint on the host, and it can be compensated with the detection gain.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
NICS | Nature-Inspired Cybersecurity |
IDS | Intrusion Detection System |
HIDS | Host-based Intrusion Detection System |
NIDS | Network-based Intrusion Detection System |
AI | Artificial Intelligence |
ML | Machine Learning |
SVM | Support Vector Machine |
MANET | Mobile ad hoc Network |
WSN | Wireless Sensor Network |
FA | Firefly Algorithm |
FFA | Fluffy Firefly Algorithm |
FLN | Fast Learning System |
PCA | Principal Component Analysis |
TP | Throughput |
ETED | End-to-End Delay |
PDR | Packet Delivery Ratio |
HF | Health Function |
RCA | Root Cause Analysis |
HTTP | Hyper Text Transfer Protocol |
DoS | Denial of Service |
References
- Kumar, R.; K, D.; Dumka, a.; Loganathan, J. RFA Reinforced Firefly Algorithm to Identify Optimal Feature Subsets for Network IDS. Int. J. Grid High Perform. Comput. 2020, 12, 5. [Google Scholar] [CrossRef]
- Thakkar, A.; Lohiya, R. Role of swarm and evolutionary algorithms for intrusion detection system: A survey. Swarm Evol. Comput. 2020, 53, 100631. [Google Scholar] [CrossRef]
- Pervez, M.S.; Farid, D. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In Proceedings of the SKIMA 2014—8th International Conference on Software, Knowledge, Information Management and Applications, Dhaka, Bangladesh, 15–17 December 2015. [Google Scholar] [CrossRef]
- Çavuşoğlu, U. A new hybrid approach for intrusion detection using machine learning methods. Appl. Intell. 2019, 49, 2735–2761. [Google Scholar] [CrossRef]
- Selvakumar, B.; Muneeswaran, K. Firefly algorithm based feature selection for network intrusion detection. Comput. Secur. 2019, 81, 148–155. [Google Scholar]
- Chen, J.; Wu, D.; Zhao, Y.; Sharma, N.; Blumenstein, M.; Yu, S. Fooling intrusion detection systems using adversarially autoencoder. Digit. Commun. Netw. 2020, 7, 453–460. [Google Scholar] [CrossRef]
- Nijim, M.; Goyal, A.; Mishra, A.; Hicks, D. A Review of Nature-Inspired Artificial Intelligence and Machine Learning Methods for Cybersecurity Applications. In Advances in Nature-Inspired Cyber Security and Resilience; Springer: Cham, Switzerland, 2022; pp. 109–118. [Google Scholar]
- Yang, X.S. Nature-Inspired Metaheuristic Algorithms; Luniver Press: Cambridge, UK, 2008; Volume 12, ISBN 978-1-905986-10-1. [Google Scholar]
- Ahmed, A.A.; Maheswari, D. Churn prediction on huge telecom data using hybrid firefly based classification. Egypt. Inform. J. 2017, 18, 215–220. [Google Scholar] [CrossRef]
- Adaniya, M.H.; Carvalho, L.F.; Zarpelão, B.B.; Sampaio, L.D.; Abrão, T.; Jeszensky, P.J.E.; Proença, M.L., Jr. Firefly Algorithm in Telecommunications. In Bio-Inspired Computation in Telecommunications; Elsevier: Amsterdam, The Netherlands, 2015; pp. 43–72. [Google Scholar]
- Adaniya, M.H.; Lima, M.F.; Rodrigues, J.J.; Abrao, T.; Proença, M.L. Anomaly detection using dsns and firefly harmonic clustering algorithm. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 1183–1187. [Google Scholar]
- Tuba, E.; Tuba, M.; Beko, M. Two stage wireless sensor node localization using firefly algorithm. In Smart Trends in Systems, Security and Sustainability; Springer: Singapore, 2018; pp. 113–120. [Google Scholar]
- Mahdi, M.S.; Hassan, N.F. Design of keystream Generator utilizing Firefly Algorithm. J. Al-Qadisiyah Comput. Sci. Math. 2018, 10, 91. [Google Scholar]
- Yu, G. A modified firefly algorithm based on neighborhood search. Concurr. Comput. Pract. Exp. 2020, 33, e6066. [Google Scholar] [CrossRef]
- Liaquat, S.; Saleem, O.; Azeem, K. Comparison of Firefly and Hybrid Firefly-APSO Algorithm for Power Economic Dispatch Problem. In Proceedings of the IEEE 2020 International Conference on Technology and Policy in Energy and Electric Power (ICT-PEP), Bandung, Indonesia, 23–24 September 2020; pp. 94–99. [Google Scholar] [CrossRef]
- Lakshmana Rao, K.; Sireesha, R.; Shanti, C. On the convergence and optimality of the firefly algorithm for opportunistic spectrum access. Int. J. Adv. Intell. Paradig. 2021, 18, 119. [Google Scholar] [CrossRef]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surv. Tutor. 2015, 18, 184–208. [Google Scholar] [CrossRef]
- Zaid, M.; Agarwal, P. Intelligent Intrusion Detection System Optimized using Nature-Inspired Algorithms. In Proceedings of the IEEE 2022 1st International Conference on Informatics (ICI), Noida, India, 14–16 April 2022; pp. 80–85. [Google Scholar]
- Najeeb, R.F.; Dhannoon, B.N. A feature selection approach using binary firefly algorithm for network intrusion detection system. ARPN J. Eng. Appl. Sci. 2018, 13, 2347–2352. [Google Scholar]
- Ram, B.; Rao, B. An Efficient Ids Based on Fuzzy Firefly Optimization and Fast Learning Network. Int. J. Eng. Technol. 2018, 7, 557–561. [Google Scholar] [CrossRef]
- Dhanarao, S.; Kumar, M. Efficient IDs for MANET Using Hybrid Firefly with a Genetic Algorithm. In Proceedings of the 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, 11–12 July 2019. [Google Scholar]
- Albadran, M. A new Firefly-Fast Learning Network model based Intrusion-Detection System. Int. J. Innov. Technol. Explor. Eng. 2020, 8, 146–152. [Google Scholar] [CrossRef]
- Hossein, P.; Reza, F. A firefly algorithm for power management in wireless sensor networks (WSNs). J. Supercomput. 2021, 77, 9411–9432. [Google Scholar] [CrossRef]
- Junlong, X.; Westerlund, M.; Sovilj, D.; Pulkkis, G. Using Extreme Learning Machine for Intrusion Detection in a Big Data Environment. In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, Scottsdale, AZ, USA, 7 November 2014; Volume 2014. [Google Scholar] [CrossRef]
- Deshmukh, D.; Ghorpade, T.; Padiya, P. Improving classification using preprocessing and machine learning algorithms on NSL-KDD dataset. In Proceedings of the 2015 International Conference on Communication, Information and Computing Technology, ICCICT 2015, Mumbai, India, 15–17 January 2015. [Google Scholar] [CrossRef]
- Al-Yaseen, W.; Othman, Z.; Ahmad Nazri, M.Z. Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 2017, 67, 296–303. [Google Scholar] [CrossRef]
- Singh, R. An Intrusion Detection System using Network Traffic Profiling and Online Sequential Extreme Learning Machine. Expert Syst. Appl. 2015, 42, 8609–8624. [Google Scholar] [CrossRef]
- Kaur, A.; Pal, S.K.; Singh, A.P. Hybridization of K-Means and Firefly Algorithm for intrusion detection system. Int. J. Syst. Assur. Eng. Manag. 2018, 9, 901–910. [Google Scholar] [CrossRef]
- Ghosh, P.; Sarkar, D.; Sharma, J.; Phadikar, S. An Intrusion Detection System Using Modified-Firefly Algorithm in Cloud Environment. Int. J. Digit. Crime Forensics (IJDCF) 2021, 13, 77–93. [Google Scholar] [CrossRef]
- Fister, I.; Fister, I., Jr.; Yang, X.S.; Brest, J. A comprehensive review of firefly algorithms. Swarm Evol. Comput. 2013, 13, 34–46. [Google Scholar] [CrossRef] [Green Version]
- Bhattacharya, S.; Somayaji, S.; Reddy, P.; Kaluri, R.; Singh, S.; Gadekallu, T.; Alazab, M.; Tariq, U. A Novel PCA-Firefly based XGBoost classification model for Intrusion Detection in Networks using GPU. Electronics 2020, 9, 219. [Google Scholar] [CrossRef] [Green Version]
- Karatas, G.; Demir, O.; Sahingoz, O. Increasing the Performance of Machine Learning-Based IDSs on an Imbalanced and Up-to-Date Dataset. IEEE Access 2020, 8, 32150–32162. [Google Scholar] [CrossRef]
- Shandilya, S.K.; Upadhyay, S.; Kumar, A.; Nagar, A.K. AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis. Future Gener. Comput. Syst. 2022, 127, 297–308. [Google Scholar] [CrossRef]
Work | Contribution | Use of Firefly | Application Domain | Remarks |
---|---|---|---|---|
An IDS using modified-FA in cloud environment [29] |
| Feature Selection | ML-based IDS | Passive FA |
A feature selection approach using binary FA for network IDS [18] |
| Multi-objective feature selection | ML-based IDS | Passive FA |
Hybridization of K-Means and FA for IDS [28] |
| Classification | ML and Nature-inspired IDS | Passive FA |
An efficient IDS based on Fuzzy FA optimization and fast learning network [20] |
| To Obtain Optimal Weights and Threshold values. | Bio-inspired IDS | Passive FA |
FA-based feature selection for network IDS [5] |
| Feature Selection | ML-based IDS | Passive FA |
A modified FA based on neighborhood search [14] |
| Firefly Optimization | Optimization | N/A |
Anomaly detection using DSNS * and firefly harmonic clustering algorithm [10] |
| Feature Optimization | Optimization, ML Model Training | Passive FA |
PCA *-FA- based XGBoost classification model for intrusion detection in networks using GPU [31] |
| Feature Optimization | Optimization, ML Model Training | Passive FA |
Design of keystream generator utilizing FA [13] |
| Random key Generation | Cryptography | N/A |
Parameter | Description and Use |
---|---|
NodeObjectList | Node Object used by SetCoordinate() function. |
NF | Number of fireflies |
Step size: used in newgenerateFiref ly() function. | |
Absorption coefficient:used in newgenerateFiref ly() function. | |
Initial brightness: used in UpdateBrightness() function. |
Cluster | Protocol | Configuration | Connection |
---|---|---|---|
C1N() | Telnet | 500 MB at interval of 0.01 s | C5N |
C2N(x) | FTP | 500 MB at interval of 0.01 s | C4N |
C3N(x) | SMTP | 20,000 bytes with 50 ms and 50 ms at 100 KBps | C3N |
C4N(x) | HTTP | 100 MB at 1 MBps | C3N |
C5N(x) | TCP CBR | 50 MB | C1N |
MALN1 | TCP CBR | 100 MB | C5N via R3 and R2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shandilya, S.K.; Choi, B.J.; Kumar, A.; Upadhyay, S. Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity. Processes 2023, 11, 715. https://doi.org/10.3390/pr11030715
Shandilya SK, Choi BJ, Kumar A, Upadhyay S. Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity. Processes. 2023; 11(3):715. https://doi.org/10.3390/pr11030715
Chicago/Turabian StyleShandilya, Shishir Kumar, Bong Jun Choi, Ajit Kumar, and Saket Upadhyay. 2023. "Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity" Processes 11, no. 3: 715. https://doi.org/10.3390/pr11030715
APA StyleShandilya, S. K., Choi, B. J., Kumar, A., & Upadhyay, S. (2023). Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity. Processes, 11(3), 715. https://doi.org/10.3390/pr11030715