2023
DOI: 10.3390/pr11030715
|View full text |Cite
|
Sign up to set email alerts
|

Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity

Abstract: The new paradigm of nature-inspired cybersecurity can establish a robust defense by utilizing well-established nature-inspired computing algorithms to analyze networks and act quickly. The existing research focuses primarily on the efficient selection of features for quick and optimized detection rates using firefly and other nature-inspired optimization techniques. However, selecting the most appropriate features may be specific to the network, and a different set of features may work better than the selected… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…T r +ve T r +ve + F l −ve (12) Accuracy (ACC) is a significant metric widely used in classification tasks to measure the concert of a classifier. It is computed by dividing the number of accurate estimates by the overall number of estimates by the classifier.…”
Section: R =mentioning
confidence: 99%
See 1 more Smart Citation
“…T r +ve T r +ve + F l −ve (12) Accuracy (ACC) is a significant metric widely used in classification tasks to measure the concert of a classifier. It is computed by dividing the number of accurate estimates by the overall number of estimates by the classifier.…”
Section: R =mentioning
confidence: 99%
“…Recently, researchers from various domains applied meta-heuristic algorithms to FS. Some of the recent works that used metaheuristic algorithms for FS in IDS are: Genetic Algorithm (GA) [7], Bat Optimization algorithm (BOA) [10], Particle Swarm Optimization (PSO) [8], Dragonfly Algorithm (DA) [11], Grey Wolf Optimization (GWO) [9], Firefly optimization (FFO) [12], whale optimization algorithm (WOA) [13] and Pigeon Inspired Optimizer (PIO) [14]. Among them, Alazzam et al [14] proposed a PIO to select the prominent features by eradicating the redundant features.…”
Section: Introductionmentioning
confidence: 99%
“…Almomani et al [ 42 ] have used the Firefly Algorithm for feature selection and SVM together with J48 classifier on the UNSW-NB15 dataset. Shandilya et al [ 43 ] have used the Firefly Algorithm for the selection of nodes that could be monitored in a network. The authors have used SVM classifier on the NSL-KDD dataset.…”
Section: Related Workmentioning
confidence: 99%
“…In [14] the authors combined the FFA with VNS for Data Clustering (FA-VNS), the results showed that the proposed algorithm performance better than other well-known clustering algorithms in literature. In [15] the authors propose a modified FFA to effectively observe the network by introducing a new health function for early detection of suspicious nodes, the results showed that the proposed algorithm reduces the number of suspicious nodes. In this paper, we proposed three modifications to firefly algorithm FFA and used IDM algorithm to improve the performance of the original algorithm.…”
Section: Introductionmentioning
confidence: 99%