Abstract
Cloud computing environments provide users with Internet-based services and one of their main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a defensive strategy in such environments is essential. Multiple parameters are used to evaluate the IDSs, the most important aspect of which is the feature selection method used for classifying the malicious and legitimate activities. We have organized this research to determine an effective feature selection method to increase the accuracy of the classifiers in detecting intrusion. A Hybrid Ant-Bee Colony Optimization (HABCO) method is proposed to convert the feature selection problem into an optimization problem. We examined the accuracy of HABCO with BHSVM, IDSML, DLIDS, HCRNNIDS, SVMTHIDS, ANNIDS, and GAPSAIDS. It is shown that HABCO has a higher accuracy compared with the mentioned methods.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Javadpour, A.: Improving resources management in network virtualization by utilizing a software-based network. Wirel. Personal Commun. 106(2), 505–519 (2019)
Javadpour, A., Wang, G., Rezaei, S., Chend, S.: Power curtailment in cloud environment utilising load balancing machine allocation. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, pp. 1364–1370 (2018)
Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Integration of blockchain and cloud of things: architecture, applications and challenges. IEEE Commun. Surv. Tutor. 22(4), 2521–2549 (2020)
Sangaiah, A.K., Javadpour, A., Jáfari, F., Pinto, P., Ahmadi, H., Zhang, W.: CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities. Microprocess Microsyst. 90, 104504 (2022)
Mirmohseni, S.M., Javadpour, A., Tang, C.: Lbpsgora: create load balancing with particle swarm genetic optimization algorithm to improve resource allocation and energy consumption in clouds networks. Math. Problems Eng. 2021, 1 (2021)
Javadpour, A., Wang, G., Xing, X.: Managing heterogeneous substrate resources by mapping and visualization based on software-defined network. In: 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), 316–321 Dec 2018 (2018)
Mirmohseni, S.M., Tang, C., Javadpour, A.: Using markov learning utilization model for resource allocation in cloud of thing network. Wirel. Pers. Commun. 115(1), 653–677 (2020)
Javadpour, A., Wang, G., Rezaei, S., Li, K.-C.: Detecting straggler map reduce tasks in big data processing infrastructure by neural network. J. Supercomput. 76(9), 6969–6993 (2020)
Musa, U.S., Chhabra, M., Ali, A., Kaur, M.: Intrusion detection system using machine learning techniques: a review. In: 2020 International Conference on Smart Electronics and Communication (ICOSEC). IEEE, pp. 149–155 (2020)
Alkhaldi, S.R., Alzahrani, S.M.: Intrusion detection systems based on artificial intelligence techniques. Acad. J. Res. Sci. Publish. 2, 21 (2021)
Javadpour, A., Wang, G., Rezaei, S.: Resource management in a peer to peer cloud network for iot. Wirel. Personal Commun. 115(3), 2471–2488 (2020)
Kumar, M., Singh, A.K.: Distributed intrusion detection system using blockchain and cloud computing infrastructure. In: 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184). IEEE, pp. 248–252 (2020)
Javadpour, A., Pinto, P., Ja’fari, F. et al. DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput (2022). https://doi.org/10.1007/s10586-022-03621-3
Ja’fari, F., Mostafavi, S., Mizanian, K., Jafari, E.: An intelligent botnet blocking approach in software defined networks using honeypots. J. Ambient Intell. Hum. Comput. 12(2), 2993–3016 (2021)
Jaw, E., Wang, X.: Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach. Symmetry 13(10), 1764 (2021)
Javadpour, A., Rezaei, S., Li, K.-C., Wang, G.: A scalable feature selection and opinion miner using whale optimization algorithm. In: International Symposium on Signal Processing and Intelligent Recognition Systems, pp. 237–247. Springer, Berlin (2019)
Alzahrani, A.O., Alenazi, M.J.: Designing a network intrusion detection system based on machine learning for software defined networks. Future Internet 13(5), 111 (2021)
Toshniwal, A., Mahesh, K., Jayashree, R.: Overview of anomaly detection techniques in machine learning. In: 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). IEEE, pp. 808–815 (2020)
Khan, M.A.: Hcrnnids: hybrid convolutional recurrent neural network-based network intrusion detection system. Processes 9(5), 834 (2021)
Javadpour, A., Abharian, S.K., Wang, G.: Feature selection and intrusion detection in cloud environment based on machine learning algorithms. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC). IEEE, pp. 1417–1421 (2017)
Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manag. 18(2), 1137–1151 (2021)
Maithem, M., Al-sultany, G.A.: Network intrusion detection system using deep neural networks. In: Journal of Physics Conference Series, vol. 1804. IOP Publishing, New York (2021)
Beechey, M., Kyriakopoulos, K.G., Lambotharan, S.: Evidential classification and feature selection for cyber-threat hunting. Knowl.-Based Syst. 226, 107120 (2021)
Sajith, P., Nagarajan, G.: Optimized intrusion detection system using computational intelligent algorithm. In: Advances in Electronics, Communication and Computing, pp. 633–639. Springer, Berlin (2021)
Adhao, R., Pachghare, V.: Feature selection based on hall of fame strategy of genetic algorithm for flow-based ids. In: Data Science and Security, pp. 310–316. Springer, Berlin (2021)
Sabar, N.R., Yi, X., Song, A.: A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access 6, 10421–10431 (2018)
Li, X., Xiao, S., Wang, C., Yi, J.: Mathematical modeling and a discrete artificial bee colony algorithm for the welding shop scheduling problem. Memetic Comput. 11(4), 371–389 (2019)
Thilagam, T., Aruna, R.: Intrusion detection for network based cloud computing by custom rc-nn and optimization. ICT Express 7(4), 512–520 (2021)
Acknowledgements
This work was supported in part by the National Key Research and Development Program of China (2020YFB1406902), the Key-Area Research and Development Program of Guangdong Province (2020B0101360001), the Shenzhen Science and Technology Research and Development Foundation (JCYJ20190806143418198), the National Natural Science Foundation of China (NSFC) (61872110), and the Peng Cheng Laboratory Project (PCL2021A02).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Research involving human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sangaiah, A.K., Javadpour, A., Ja’fari, F. et al. A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things. Cluster Comput 26, 599–612 (2023). https://doi.org/10.1007/s10586-022-03629-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-022-03629-9