Skip to main content
Log in

BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Intrusion detection datasets are highly likely to contain numerous redundant, irrelevant, and noisy features that slow the performance of the machine learning techniques and classifiers that may be applied to them. The feature selection approach is used for reducing the number of features in intrusion detection datasets and eliminating those that are not important. One of the most powerful structured population approaches is the Cellular Automata approach, which is used to enhance the diversity and convergence of population-based optimization algorithms. In this work, the Cellular Automata approach, Mixed opposition-based learning, and the K-Nearest Neighbor classifier are incorporated with the Prairie dog optimization algorithm (PDO) in a new intrusion detection framework called Binary Opposition Cellular Prairie dog optimization algorithm (BOC-PDO). The proposed framework contains four key features. First, the Cellular Automata model is utilized to enhance the population of feasible solutions in the PDO. Second, four S-shaped and four V-shaped Binary Transfer Functions are used to convert the continuous solutions in BOC-PDO to binary ones. Third, the Mixed opposition-based learning approach is used at the end of the optimization loop of BOC-PDO to improve capacity for exploration. Fourth, the K-Nearest Neighbor classifier is used as the main learning model in BOC-PDO. Eleven famous intrusion detection datasets were employed in the evaluation of the effectiveness of BOC-PDO compared to eight popular binary optimization algorithms and four machine learning approaches. According to the overall simulation results, BOC-PDO scored the highest accuracy, best objective value, and fewest selected features for each of the eleven intrusion detection datasets. Besides, the reliability and consistency of the simulation results of BOC-PDO compared to the other tested algorithms were established using Friedman and Wilcoxon statistical tests.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Algorithm 3
Algorithm 4
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Availability of data and materials

The datasets employed in the experiments are publicly available at https://archive.ics.uci.edu/.

References

  1. Thomas, T., Vijayaraghavan, A.P., Emmanuel, S.: Machine learning approaches in cyber security analytics. Springer, Cham (2020).

  2. Barhoush, M., Abed-alguni, B.H., Al-qudah, N.E.A.: Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems. J. Supercomput. 79(18), 21265–21309 (2023)

    Google Scholar 

  3. Alawad, N.A., et al.: Binary improved white shark algorithm for intrusion detection systems. Neural Comput. Appl. 35(26), 19427–19451 (2023)

    Google Scholar 

  4. Farahmand, F., et al. Managing vulnerabilities of information systems to security incidents. In: Proceedings of the 5th international conference on Electronic commerce (2003).

  5. Zhang, Y., Zhang, H., Zhang, B.: An effective ensemble automatic feature selection method for network intrusion detection. Information 13(7), 314 (2022)

    Google Scholar 

  6. Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. (CSUR) 51(3), 1–36 (2018)

    Google Scholar 

  7. Drewek-Ossowicka, A., Pietrołaj, M., Rumiński, J.: A survey of neural networks usage for intrusion detection systems. J. Ambient. Intell. Humaniz. Comput. 12(1), 497–514 (2021)

    Google Scholar 

  8. Maza, S., Touahria, M.: Feature selection algorithms in intrusion detection system: a survey. KSII Trans. Internet Inform. Syst. (TIIS) 12(10), 5079–5099 (2018)

    Google Scholar 

  9. Abed-alguni, B.H., AL-Jarah, S.H.: IBJA: An improved binary DJaya algorithm for feature selection. J. Comput. Sci. 75, 102201 (2024).

  10. Abed-Alguni, B.H., et al.: Opposition-based sine cosine optimizer utilizing refraction learning and variable neighborhood search for feature selection. Appl. Intell. 53(11), 13224–13260 (2023)

    Google Scholar 

  11. Mafarja, M.M., Mirjalili, S.: Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 260, 302–312 (2017)

    Google Scholar 

  12. Abed-alguni, B.H., Alkhateeb, F.: Intelligent hybrid cuckoo search and β-hill climbing algorithm. J. King Saud Univ. Comp. Inform. Sci. 32(2), 159–173 (2020)

    Google Scholar 

  13. Alkhateeb, F., Abed-alguni, B.H., Al-rousan, M.H.: Discrete hybrid cuckoo search and simulated annealing algorithm for solving the job shop scheduling problem. J. Supercomput. 78(4), 4799–4826 (2022)

    Google Scholar 

  14. Abed-Alguni, B.H., et al.: A comparison study of cooperative Q-learning algorithms for independent learners. Int. J. Artif. Intell 14(1), 71–93 (2016)

    Google Scholar 

  15. Abed-Alguni, B.H., Alkhateeb, F.: Novel selection schemes for cuckoo search. Arab. J. Sci. Eng. 42(8), 3635–3654 (2017)

    Google Scholar 

  16. Abualigah, L., et al.: Reptile Search Algorithm (RSA): a nature-inspired meta-heuristic optimizer. Expert Syst. Appl. 191, 116158 (2022)

    Google Scholar 

  17. Jia, H., et al.: Crayfish optimization algorithm. Artif. Intell. Rev. 56(Suppl 2), 1919–1979 (2023)

    Google Scholar 

  18. Hubálovská, M., Hubálovský, Š, Trojovský, P.: Botox optimization algorithm: a new human-based metaheuristic algorithm for solving optimization problems. Biomimetics 9(3), 137 (2024)

    Google Scholar 

  19. Abed-alguni, B.H.: Bat Q-learning algorithm. Jordanian J. Comput. Inform. Technol. (JJCIT) 3(1), 56–77 (2017)

    Google Scholar 

  20. Ezugwu, A.E., et al.: Prairie dog optimization algorithm. Neural Comput. Appl. 34(22), 20017–20065 (2022)

    Google Scholar 

  21. Wolpert, D.H., Macready, W.G.: No free lunch theorems for search. Citeseer (1995).

  22. Abualigah, L., et al.: Salp swarm algorithm: a comprehensive survey. Neural Comput. Appl. 32(15), 11195–11215 (2020)

    Google Scholar 

  23. Abed-Alguni, B.H., Paul, D.J.: Hybridizing the cuckoo search algorithm with different mutation operators for numerical optimization problems. J. Intell. Syst. 29(1), 1043–1062 (2019)

    Google Scholar 

  24. Shehab, M., et al.: Harris hawks optimization algorithm: variants and applications. Arch. Comput. Methods Eng. 29(7), 5579–5603 (2022)

    Google Scholar 

  25. Guerrero-Luis, M., Valdez, F., Castillo, G.: A review on the cuckoo search algorithm. In: Fuzzy Logic Hybrid Extensions of Neural and Optimization Algorithms: Theory and Applications, pp 113–124 (2021).

  26. Abed-alguni, B.H., et al.: Exploratory cuckoo search for solving single-objective optimization problems. Soft. Comput. 25(15), 10167–10180 (2021)

    Google Scholar 

  27. Alkhateeb, F., Abed-Alguni, B.H.: A hybrid cuckoo search and simulated annealing algorithm. J. Intell. Syst. 28(4), 683–698 (2019)

    Google Scholar 

  28. Braik, M., et al.: White Shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 243, 108457 (2022)

    Google Scholar 

  29. Mafarja, M., et al.: Augmented whale feature selection for IoT attacks: Structure, analysis and applications. Futur. Gener. Comput. Syst. 112, 18–40 (2020)

    Google Scholar 

  30. Abed-alguni, B.H., Klaib, A.F.: Hybrid whale optimisation and β-hill climbing algorithm for continuous optimisation problems. Int. J. Comput. Sci. Math. 12(4), 350–363 (2020)

    MathSciNet  Google Scholar 

  31. Gunduz, M., Aslan, M.: DJAYA: A discrete Jaya algorithm for solving traveling salesman problem. Appl. Soft Comput. 105, 107275 (2021)

    Google Scholar 

  32. Khodadadi, N., et al.: BAOA: binary arithmetic optimization algorithm with K-nearest neighbor classifier for feature selection. IEEE Access (2023).

  33. Abualigah, L., et al.: The arithmetic optimization algorithm. Comput. Methods Appl. Mech. Eng. 376, 113609 (2021)

    MathSciNet  Google Scholar 

  34. Alawad, N.A., Abed-alguni, B.H., Saleh, I.I.: Improved arithmetic optimization algorithm for patient admission scheduling problem. Soft Comput., pp 1–27 (2023).

  35. Dhiman, G., et al.: BEPO: a novel binary emperor penguin optimizer for automatic feature selection. Knowl.-Based Syst. 211, 106560 (2021)

    Google Scholar 

  36. Khalid, O.W., Isa, N.A.M., Sakim, H.A.M.: Emperor penguin optimizer: a comprehensive review based on state-of-the-art meta-heuristic algorithms. Alex. Eng. J. 63, 487–526 (2023)

    Google Scholar 

  37. Sharma, S., Kumar, V., Dutta, K.: Multi‐objective prairie dog optimization algorithm for IoT‐based intrusion detection. Internet Technol. Lett. p. e516.

  38. Murata, T., Ishibuchi, H.: MOGA: multi-objective genetic algorithms. in IEEE international conference on evolutionary computation. IEEE Piscataway (1995).

  39. Dong, H., et al.: A novel hybrid genetic algorithm with granular information for feature selection and optimization. Appl. Soft Comput. 65, 33–46 (2018)

    Google Scholar 

  40. Maier, J.F., Eckert, C.M., Clarkson, P.J.: Model granularity in engineering design–concepts and framework. Des. Sci. 3, e1 (2017)

    Google Scholar 

  41. Arora, S., Singh, S.: Butterfly optimization algorithm: a novel approach for global optimization. Soft. Comput. 23, 715–734 (2019)

    Google Scholar 

  42. Tubishat, M., et al.: Dynamic butterfly optimization algorithm for feature selection. IEEE Access 8, 194303–194314 (2020)

    Google Scholar 

  43. Agrawal, R.K., Kaur, B., Sharma, S.: Quantum based Whale Optimization Algorithm for wrapper feature selection. Appl. Soft Comput. 89, 106092 (2020)

    Google Scholar 

  44. Abed-Alguni, B.H., Klaib, A.F., Nahar, K.M.: Island-based whale optimisation algorithm for continuous optimisation problems. Int. J. Reason.-Based Intell. Syst. 11(4), 319–329 (2019)

    Google Scholar 

  45. Goswami, N., et al.: Intrusion detection system for IoT-based Healthcare Intrusions with Lion-Salp-Swarm-Optimization Algorithm: metaheuristic-enabled hybrid intelligent approach. Eng. Sci. 25, 933 (2023)

    Google Scholar 

  46. Ghanbarzadeh, R., Hosseinalipour, A., Ghaffari, A.: A novel network intrusion detection method based on metaheuristic optimisation algorithms. J. Ambient. Intell. Humaniz. Comput. 14(6), 7575–7592 (2023)

    Google Scholar 

  47. Sanju, P.: Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks. J. Eng. Res. 11(4), 356–361 (2023)

    Google Scholar 

  48. Stankovic, M., et al.: Feature selection by hybrid artificial bee colony algorithm for intrusion detection. in 2022 International Conference on Edge Computing and Applications (ICECAA). IEEE, New York (2022).

  49. Bacanin, N., et al.: Intrusion detection by XGBoost model tuned by improved social network search algorithm. in International Conference on Modelling and Development of Intelligent Systems. Springer, Cham (2022).

  50. Savanović, N., et al., Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning. Sustainability, 2023. 15(16): p. 12563.

  51. Tawhid, M.A., Ibrahim, A.M.: Feature selection based on rough set approach, wrapper approach, and binary whale optimization algorithm. Int. J. Mach. Learn. Cybern. 11(3), 573–602 (2020)

    Google Scholar 

  52. Hijjawi, M., et al.: A Novel Hybrid Prairie Dog Algorithm and Harris Hawks Algorithm for Resource Allocation of Wireless Networks. IEEE Access, (2023).

  53. Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)

    Google Scholar 

  54. Abualigah, L., et al.: Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems. Multimedia Tools Appl., pp 1–41 (2023).

  55. Agushaka, J.O., Ezugwu, A.E., Abualigah, L.: Dwarf mongoose optimization algorithm. Comput. Methods Appl. Mech. Eng. 391, 114570 (2022)

    MathSciNet  Google Scholar 

  56. Abed-alguni, B.H., Barhoush, M.: Distributed grey wolf optimizer for numerical optimization problems. Jordanian J. Comput. Inf. Technol. (JJCIT) 4(03), 21 (2018)

    Google Scholar 

  57. Abed-alguni, B.H., Paul, D.: Island-based Cuckoo Search with elite opposition-based learning and multiple mutation methods for solving optimization problems. Soft. Comput. 26(7), 3293–3312 (2022)

    Google Scholar 

  58. Abed-Alguni, B.H., Paul, D., Hammad, R.: Improved Salp swarm algorithm for solving single-objective continuous optimization problems. Appl. Intell. 52(15), 17217–17236 (2022)

    Google Scholar 

  59. Abualigah, L., et al.: Opposition-based Laplacian distribution with Prairie Dog Optimization method for industrial engineering design problems. Comput. Methods Appl. Mech. Eng. 414, 116097 (2023)

    Google Scholar 

  60. Izci, D., Ekinci, S., Hussien, A.G.: Efficient parameter extraction of photovoltaic models with a novel enhanced prairie dog optimization algorithm. Sci. Rep. 14(1), 7945 (2024)

    Google Scholar 

  61. Tang, A., et al.: A chaos sparrow search algorithm with logarithmic spiral and adaptive step for engineering problems. CMES-Comp. Model. Eng. Sci. 130(1) (2022).

  62. Aribowo, W., et al.: A novel hybrid prairie dog optimization algorithm-marine predator algorithm for tuning parameters power system stabilizer. J. Robot. Control (JRC) 4(5), 686–695 (2023)

    Google Scholar 

  63. Faramarzi, A., et al.: Marine predators algorithm: a nature-inspired metaheuristic. Expert Syst. Appl. 152, 113377 (2020)

    Google Scholar 

  64. Vatambeti, R., et al.: Prediction of DDoS attacks in agriculture 4.0 with the help of prairie dog optimization algorithm with IDSNet. Scientific Reports. 13(1), 15371 (2023).

  65. Sherstinsky, A.: Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D 404, 132306 (2020)

    MathSciNet  Google Scholar 

  66. Zitouni, F., et al.: APDO: A Hybrid Aquila Optimizer and Prairie Dog Optimization Metaheuristic Algorithm for Global, Optimization. In 2023 Computer Applications & Technological Solutions (CATS). IEEE, New York (2023).

  67. Abualigah, L., et al.: Aquila optimizer: a novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 157, 107250 (2021)

    Google Scholar 

  68. Al-Betar, M.A., et al.: Cellular harmony search for optimization problems. J. Appl. Math. (2013).

  69. Awadallah, M.A., Al-Betar, M.A., Doush, A.: cJAYA: Cellular JAYA algorithm. In: 2020 international conference on promising electronic technologies (ICPET). IEEE, New York (2020).

  70. Awadallah, M.A., et al.: CCSA: cellular crow search algorithm with topological neighborhood shapes for optimization. Expert Syst. Appl. 194, 116431 (2022)

    Google Scholar 

  71. Al-Betar, M.A., et al.: Coronavirus herd immunity optimizer (CHIO). Neural Comput. Appl. 33(10), 5011–5042 (2021)

    Google Scholar 

  72. Al-Betar, M.A.: β-hill climbing: an exploratory local search. Neural Comput. Appl. 28(Suppl 1), 153–168 (2017)

    Google Scholar 

  73. Remeseiro, B., Bolon-Canedo, V.: A review of feature selection methods in medical applications. Comput. Biol. Med. 112, 103375 (2019)

    Google Scholar 

  74. Vandana, C., Chikkamannur, A.A.: Feature selection: an empirical study. Int. J. Eng. Trends Technol. 69(2), 165–170 (2021)

    Google Scholar 

  75. Solorio-Fernández, S., Carrasco-Ochoa, J.A., Martínez-Trinidad, J.F.: A review of unsupervised feature selection methods. Artif. Intell. Rev. 53(2), 907–948 (2020)

    Google Scholar 

  76. Khaire, U.M., Dhanalakshmi, R.: Stability of feature selection algorithm: a review. J. King Saud Univ.-Comp. Inform. Sci. 34(4), 1060–1073 (2022)

    Google Scholar 

  77. Lim, S.L.O., Pang, C.H., Hoon, G.K.: Cellular Automata for Evacuation Simulation. In 2019 IEEE Conference on Sustainable Utilization and Development in Engineering and Technologies (CSUDET). IEEE, New York (2019).

  78. Ibrahimi, M.,:Logistic cellular automata. Bilkent Universitesi (Turkey) (2019).

  79. Gao, Z.-M., Zhao, J., Li, S.-R.:The binary equilibrium optimization algorithm with sigmoid transfer functions. In: Proceedings of the 2020 12th International Conference on Machine Learning and Computing (2020).

  80. Alawad, N.A., Abed-alguni, B.H.: Discrete island-based cuckoo search with highly disruptive polynomial mutation and opposition-based learning strategy for scheduling of workflow applications in cloud environments. Arab. J. Sci. Eng. 46(4), 3213–3233 (2021)

    Google Scholar 

  81. Imran, M., et al.: Intrusion detection in networks using cuckoo search optimization. Soft. Comput. 26(20), 10651–10663 (2022)

    Google Scholar 

  82. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, New York (2015).

  83. Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108–116 (2018)

    Google Scholar 

  84. Paiva, F.A., et al.: Modified bat algorithm with cauchy mutation and elite opposition-based learning. In: 2017 IEEE Latin American conference on computational intelligence (LA-CCI). IEEE, New York (2017).

  85. Abed-alguni, B.H.: Action-selection method for reinforcement learning based on cuckoo search algorithm. Arab. J. Sci. Eng. 43(12), 6771–6785 (2018)

    Google Scholar 

  86. Alawad, N.A., Abed-Alguni, B.H., El-Ibini, M.: Hybrid snake optimizer algorithm for solving economic load dispatch problem with valve point effect. J. Supercomput., pp 1–50 (2024).

  87. Park, S.M., Kamondetdacha, R., Nyenhuis, J.A.: Calculation of MRI-induced heating of an implanted medical lead wire with an electric field transfer function. J. Magn. Resonan. Imag. Offic. J. Int. Soc. Magn. Resonan. Med. 26(5), 1278–1285 (2007)

    Google Scholar 

  88. Mirjalili, S., Lewis, A.: S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol. Comput. 9, 1–14 (2013)

    Google Scholar 

  89. Thejas, G., et al.: Metric and accuracy ranked feature inclusion: Hybrids of filter and wrapper feature selection approaches. IEEE Access 9, 128687–128701 (2021)

    Google Scholar 

  90. Alawad, N.A., Abed-alguni, B.H.: Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem. J. Supercomput. 78(3), 3517–3538 (2022)

    Google Scholar 

  91. Tubishat, M., et al.: Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst. Appl. 145, 113122 (2020)

    Google Scholar 

  92. Lim, T.Y., Al-Betar, M.A., Khader, A.T.: Taming the 0/1 knapsack problem with monogamous pairs genetic algorithm. Expert Syst. Appl. 54, 241–250 (2016)

    Google Scholar 

  93. Zhao, J., et al.: An improved binary cuckoo search algorithm for solving unit commitment problems: methodological description. IEEE Access 6, 43535–43545 (2018)

    Google Scholar 

  94. Abed-Alguni, B.H., Alawad, N.A.: Distributed Grey Wolf Optimizer for scheduling of workflow applications in cloud environments. Appl. Soft Comput. 102, 107113 (2021)

    Google Scholar 

  95. Abed-alguni, B.H., et al.: A multi-agent cooperative reinforcement learning model using a hierarchy of consultants, tutors and workers. Vietnam J. Comp. Sci. 2, 213–226 (2015)

    Google Scholar 

  96. Abed-alguni, B.H., Paul, D.: Island-based cuckoo search with elite opposition-based learning and multiple mutation methods for solving discrete and continuous optimization problems. (2021).

  97. Abed-alguni, B.H.: Island-based cuckoo search with highly disruptive polynomial mutation. Int. J. Artif. Intell. 17(1), 57–82 (2019)

    Google Scholar 

Download references

Funding

No funds, grants, or other support were received.

Author information

Authors and Affiliations

Authors

Contributions

B.A: Conceptualization, Investigation, Methodology, Supervision, Visualization, Writing—original draft, Writing—review & editing. B. Z.: Conceptualization, Investigation, Software, Validation, Visualization. N. A.: Methodology, Investigation, Software, Validation, Visualization, Writing—review & editing.

Corresponding author

Correspondence to Bilal H. Abed-alguni.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abed-alguni, B.H., Alzboun, B.M. & Alawad, N.A. BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm. Cluster Comput 27, 14417–14449 (2024). https://doi.org/10.1007/s10586-024-04674-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04674-2

Keywords