Skip to main content
Log in

Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

For a number of years, due to exponential increase in the demand for sustainable environment, suspicious activities have recently been identified as over-serious threats that are continually processing and growing. Identifying suspicious activities in the domain of cyber security is considered as a growing concern of research. To deal with suspicious threats, network requires traffic surveillance accompanied by beardown security policies. In order to handle data outflow, spoofing, disruption of service, energy exploiting, and insecure gateways range of attacks issues, the existing intrusion detection systems (IDSs) have observed to be less efficient as many of them are not able to detect anomalies with the change in the definition of the attack. To build a protected system against various cyber-attacks in computer networks, in this study, we introduce a multi-parallel adaptive evolutionary technique to utilize adaptation mechanism in the group of swarms for network intrusion detection. After that, simulated annealing is incorporated into multi-parallel adaptive grasshopper optimization technique to further improve the agent quality of individual after each iteration. It has revolutionized in the recent era for efficient threat detection with great performance in a certain time limit. The simulations are performed on three IDS datasets such as NSL-KDD, AWID-ATK-R, and NGIDS-DS. The proposed technique is compared with various existing techniques using different evaluation metrics. The comparative analysis demonstrates that the applicability of proposed technique concerning its merits outperforms the others algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House.

    Google Scholar 

  2. Ghazy, R. A., El-Rabaie, E.-S.M., Dessouky, M. I., El-Fishawy, N. A., & Abd El-Samie, F. E. (2020). Feature selection ranking and subset-based techniques with different classifiers for intrusion detection. Wireless Personal Communications, 111(1), 375–393.

    Article  Google Scholar 

  3. Xie, Y., Feng, D., Hu, Y., Li, Y., Sample, S., & Long, D. (2018). Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments. IEEE Transactions on Dependable and Secure Computing, 17, 1283.

    Article  Google Scholar 

  4. Prasad, R., & Rohokale, V. (2020). Artificial intelligence and machine learning in cyber security. In Cyber Security: The Lifeline of Information and Communication Technology (pp. 231–247). Springer.

  5. Jing, X., Yan, Z., Jiang, X., & Pedrycz, W. (2019). Network traffic fusion and analysis against ddos flooding attacks with a novel reversible sketch. Information Fusion, 51, 100–113.

    Article  Google Scholar 

  6. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.

    Article  Google Scholar 

  7. Prasad, R., & Rohokale, V. (2020). Cyber security: The lifeline of information and communication Technology. Berlin: Springer.

    Book  Google Scholar 

  8. Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103–117.

    Article  Google Scholar 

  9. Shunmugapriya, P., & Kanmani, S. (2017). A hybrid algorithm using ant and bee colony optimization for feature selection and classification (ac-abc hybrid). Swarm and Evolutionary Computation, 36, 27–36.

    Article  Google Scholar 

  10. Shukla, A. K. (2019). Building an effective approach toward intrusion detection using ensemble feature selection. International Journal of Information Security and Privacy (IJISP), 13(3), 31–47.

    Article  MathSciNet  Google Scholar 

  11. Zawbaa, H. M., Emary, E., Grosan, C., & Snasel, V. (2018). Large-dimensionality small-instance set feature selection: A hybrid bio-inspired heuristic approach. Swarm and Evolutionary Computation, 42, 29–42.

    Article  Google Scholar 

  12. Shukla, A. K., Pippal, S. K., & Chauhan, S. S. (2019). An empirical evaluation of teaching-learning-based optimization, genetic algorithm and particle swarm optimization. International Journal of Computers and Applications, 1, 15.

    Google Scholar 

  13. Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N., & Hutchison, D. (2019). Hybrid self-organizing feature map (som) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences, 494, 247–277.

    Article  Google Scholar 

  14. Shukla, A. K., Pippal, S. K., Gupta, S., Ramachandra Reddy, B., & Tripathi, D. (2020). Knowledge discovery in medical and biological datasets by integration of relief-f and correlation feature selection techniques. Journal of Intelligent & Fuzzy Systems, 1, 1–12.

    Google Scholar 

  15. Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Computer Networks, 176, 1072510725.

    Article  Google Scholar 

  16. Malik, A. J., & Khan, F. A. (2018). A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Computing, 21(1), 667–680.

    Article  Google Scholar 

  17. Saremi, S., Mirjalili, S., & Lewis, A. (2017). Grasshopper optimisation algorithm: Theory and application. Advances in Engineering Software, 105, 30–47.

    Article  Google Scholar 

  18. Mirjalili, S. Z., Mirjalili, S., Saremi, S., Faris, H., & Aljarah, I. (2018). Grasshopper optimization algorithm for multi-objective optimization problems. Applied Intelligence, 48(4), 805–820.

    Article  Google Scholar 

  19. Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed dos attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 43, 1–11.

    Google Scholar 

  20. Alazzam, H., Sharieh, A., & Sabri, K. E. (2020). A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Systems with Applications, 148, 113249.

    Article  Google Scholar 

  21. Xiong, H., Qiu, B., & Liu, J. (2020). An improved multi-swarm particle swarm optimizer for optimizing the electric field distribution of multichannel transcranial magnetic stimulation. Artificial Intelligence in Medicine, 104, 101790.

    Article  Google Scholar 

  22. Jamali, S., & Shaker, G. (2012). Pso-sfdd: Defense against syn flooding dos attacks by employing pso algorithm. Computers & Mathematics with Applications, 63(1), 214–221.

    Article  MATH  Google Scholar 

  23. Arora, S., & Anand, P. (2018). Chaotic grasshopper optimization algorithm for global optimization. Neural Computing and Applications, 31, 1–21.

    Google Scholar 

  24. Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, 76, 1–38.

    Article  Google Scholar 

  25. Chen, H., Li, S., Heidari, A. A., Wang, P., Li, J., Yang, Y., Wang, M., & Huang, C. (2020). Efficient multi-population outpost fruit fly-driven optimizers: Framework and advances in support vector machines. Expert Systems with Applications, 142, 112999.

  26. Wang, M., & Chen, H. (2020). Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis. Applied Soft Computing, 88, 105946.

    Article  Google Scholar 

  27. de Campos Jr, A., Pozo, A. T., & Duarte, E. P., Jr. (2019). Parallel multi-swarm pso strategies for solving many objective optimization problems. Journal of Parallel and Distributed Computing, 126, 13–33.

    Article  Google Scholar 

  28. Chen, H., Heidari, A. A., Zhao, X., Zhang, L., & Chen, H. (2020). Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies. Expert Systems with Applications, 144, 113113.

    Article  Google Scholar 

  29. Zhang, Y., Liu, X., Bao, F., Chi, J., Zhang, C., & Liu, P. (2020). Particle swarm optimization with adaptive learning strategy. Knowledge-Based Systems, 196, 105789.

    Article  Google Scholar 

  30. Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S. H., Hassan, M. M., Fortino, G., & Choo, K.-K.R. (2019). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in wsns. Information Sciences, 497, 77–90.

    Article  Google Scholar 

  31. Ambusaidi, M. A., He, X., & Nanda, P. (2015). Unsupervised feature selection method for intrusion detection system. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 295–301). IEEE.

  32. Raman, M. G., Somu, N., Kirthivasan, K., Liscano, R., & Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems, 134, 1–12.

    Article  Google Scholar 

  33. Hoang, T.-H., et al. (2018). Detect wi-fi network attacks using parallel genetic programming. In 2018 10th International Conference on Knowledge and Systems Engineering (KSE) (pp. 370–375). IEEE.

  34. Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.

    Article  Google Scholar 

  35. Haider, W., Moustafa, N., Keshk, M., Fernandez, A., Choo, K.-K.R., & Wahab, A. (2020). Fgmc-hads: Fuzzy gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. Computers & Security, 96, 101906.

    Article  Google Scholar 

  36. Lv, L., Wang, W., Zhang, Z., & Liu, X. (2020). A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowledge-Based Systems, 195, 105648.

    Article  Google Scholar 

  37. Rizzi, A., Granato, G., & Baiocchi, A. (2020). Frame-by-frame wi-fi attack detection algorithm with scalable and modular machine-learning design. Applied Soft Computing, 91, 106188.

    Article  Google Scholar 

  38. Zakeri, A., & Hokmabadi, A. (2019). Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Systems with Applications, 119, 61–72.

    Article  Google Scholar 

  39. Mafarja, M., Aljarah, I., Faris, H., Hammouri, A. I., AlaaM, A.-Z., & Mirjalili, S. (2019). Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Systems with Applications, 117, 267–286.

    Article  Google Scholar 

  40. Fathy, A. (2018). Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded pv array. Solar Energy, 171, 638–651.

    Article  Google Scholar 

  41. Cheng, C., Tay, W. P., & Huang, G.-B. (2012). Extreme learning machines for intrusion detection. In The 2012 International joint conference on neural networks (IJCNN) (pp. 1–8). IEEE.

  42. Li, C., & Wu, T. (2011). Adaptive fuzzy approach to function approximation with pso and rlse. Expert Systems with Applications, 38, 13266–13273.

    Article  Google Scholar 

  43. Xia, X., Gui, L., & Zhan, Z.-H. (2018). A multi-swarm particle swarm optimization algorithm based on dynamical topology and purposeful detecting. Applied Soft Computing, 67, 126–140.

    Article  Google Scholar 

  44. Karami, A. (2018). An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Systems with Applications, 108, 36–60.

    Article  Google Scholar 

  45. Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1–6). IEEE.

  46. Wang, H., Gu, J., & Wang, S. (2017). An effective intrusion detection framework based on svm with feature augmentation. Knowledge-Based Systems, 136, 130–139.

    Article  Google Scholar 

  47. Abdulhammed, R., Faezipour, M., Abuzneid, A., & Alessa, A. (2018). Enhancing wireless intrusion detection using machine learning classification with reduced attribute sets. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 524–529). IEEE.

  48. Haider, W., Hu, J., Slay, J., Turnbull, B. P., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of Network and Computer Applications, 87, 185–192.

    Article  Google Scholar 

  49. Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). Kdd cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41–51.

    Article  Google Scholar 

  50. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.

    Article  Google Scholar 

  51. Garg, S., Kaur, K., Batra, S., Aujla, G. S., Morgan, G., Kumar, N., Zomaya, A. Y., & Ranjan R. (2020). En-abc: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. Journal of Parallel and Distributed Computing, 135, 219–233.

  52. Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science, 25, 152–160.

    Article  Google Scholar 

  53. Jyothsna, V., & Prasad, V. R. (2016). Fcaais: Anomaly based network intrusion detection through feature correlation analysis and association impact scale. ICT Express, 2(3), 103–116.

    Article  Google Scholar 

  54. Mazini, M., Shirazi, B., & Mahdavi, I. (2018). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. Journal of King Saud University-Computer and Information Sciences, 31, 541.

    Article  Google Scholar 

  55. Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700.

    Article  MathSciNet  Google Scholar 

  56. Nahiyan, K., Kaiser, S., Ferens, K., & McLeod, R. (2017). A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In Proceedings of the 2017 International Conference on Applied Cognitive Computing (ACC’17).

  57. Vijayakumar, D. S., & Ganapathy, S. (2018). Machine learning approach to combat false alarms in wireless intrusion detection system. Computer and Information Science, 11(3), 67–81.

    Article  Google Scholar 

  58. Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752.

    Article  Google Scholar 

  59. Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for iot wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581.

    Article  Google Scholar 

  60. Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in 80.211 networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184–208.

    Article  Google Scholar 

  61. Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks, 174, 107247.

    Article  Google Scholar 

  62. Haider, W., Hu, J., Xie, Y., Yu, X., & Wu, Q. (2017). Detecting anomalous behavior in cloud servers by nested arc hidden semi-markov model with state summarization. IEEE Transactions on Big Data, 5, 3.

    Google Scholar 

  63. Haider, W., Hu, J., & Moustafa, N. (2017). Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning. In International Conference on Mobile Networks and Management (pp. 137–149). Springer.

  64. Tran, N. N., Sarker, R., & Hu, J. (2017). An approach for host-based intrusion detection system design using convolutional neural network. In International Conference on Mobile Networks and Management (pp. 116–126). Springer.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shubhra Dwivedi.

Ethics declarations

Conflicts of interest

The authors declare that no conflicts of interest.

Ethical approval

This study was performed using available datasets, as per my compliance with ethical standards there were no human or animal participants and therefore the study did not require ethics approval.

Research involving human and animal participants

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dwivedi, S., Vardhan, M. & Tripathi, S. Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks. Wireless Pers Commun 119, 2787–2816 (2021). https://doi.org/10.1007/s11277-021-08368-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08368-5

Keywords

Navigation