Abstract
Intrusion detection datasets are highly likely to contain numerous redundant, irrelevant, and noisy features that slow the performance of the machine learning techniques and classifiers that may be applied to them. The feature selection approach is used for reducing the number of features in intrusion detection datasets and eliminating those that are not important. One of the most powerful structured population approaches is the Cellular Automata approach, which is used to enhance the diversity and convergence of population-based optimization algorithms. In this work, the Cellular Automata approach, Mixed opposition-based learning, and the K-Nearest Neighbor classifier are incorporated with the Prairie dog optimization algorithm (PDO) in a new intrusion detection framework called Binary Opposition Cellular Prairie dog optimization algorithm (BOC-PDO). The proposed framework contains four key features. First, the Cellular Automata model is utilized to enhance the population of feasible solutions in the PDO. Second, four S-shaped and four V-shaped Binary Transfer Functions are used to convert the continuous solutions in BOC-PDO to binary ones. Third, the Mixed opposition-based learning approach is used at the end of the optimization loop of BOC-PDO to improve capacity for exploration. Fourth, the K-Nearest Neighbor classifier is used as the main learning model in BOC-PDO. Eleven famous intrusion detection datasets were employed in the evaluation of the effectiveness of BOC-PDO compared to eight popular binary optimization algorithms and four machine learning approaches. According to the overall simulation results, BOC-PDO scored the highest accuracy, best objective value, and fewest selected features for each of the eleven intrusion detection datasets. Besides, the reliability and consistency of the simulation results of BOC-PDO compared to the other tested algorithms were established using Friedman and Wilcoxon statistical tests.














Similar content being viewed by others
Availability of data and materials
The datasets employed in the experiments are publicly available at https://archive.ics.uci.edu/.
References
Thomas, T., Vijayaraghavan, A.P., Emmanuel, S.: Machine learning approaches in cyber security analytics. Springer, Cham (2020).
Barhoush, M., Abed-alguni, B.H., Al-qudah, N.E.A.: Improved discrete salp swarm algorithm using exploration and exploitation techniques for feature selection in intrusion detection systems. J. Supercomput. 79(18), 21265–21309 (2023)
Alawad, N.A., et al.: Binary improved white shark algorithm for intrusion detection systems. Neural Comput. Appl. 35(26), 19427–19451 (2023)
Farahmand, F., et al. Managing vulnerabilities of information systems to security incidents. In: Proceedings of the 5th international conference on Electronic commerce (2003).
Zhang, Y., Zhang, H., Zhang, B.: An effective ensemble automatic feature selection method for network intrusion detection. Information 13(7), 314 (2022)
Resende, P.A.A., Drummond, A.C.: A survey of random forest based methods for intrusion detection systems. ACM Comput. Surv. (CSUR) 51(3), 1–36 (2018)
Drewek-Ossowicka, A., Pietrołaj, M., Rumiński, J.: A survey of neural networks usage for intrusion detection systems. J. Ambient. Intell. Humaniz. Comput. 12(1), 497–514 (2021)
Maza, S., Touahria, M.: Feature selection algorithms in intrusion detection system: a survey. KSII Trans. Internet Inform. Syst. (TIIS) 12(10), 5079–5099 (2018)
Abed-alguni, B.H., AL-Jarah, S.H.: IBJA: An improved binary DJaya algorithm for feature selection. J. Comput. Sci. 75, 102201 (2024).
Abed-Alguni, B.H., et al.: Opposition-based sine cosine optimizer utilizing refraction learning and variable neighborhood search for feature selection. Appl. Intell. 53(11), 13224–13260 (2023)
Mafarja, M.M., Mirjalili, S.: Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 260, 302–312 (2017)
Abed-alguni, B.H., Alkhateeb, F.: Intelligent hybrid cuckoo search and β-hill climbing algorithm. J. King Saud Univ. Comp. Inform. Sci. 32(2), 159–173 (2020)
Alkhateeb, F., Abed-alguni, B.H., Al-rousan, M.H.: Discrete hybrid cuckoo search and simulated annealing algorithm for solving the job shop scheduling problem. J. Supercomput. 78(4), 4799–4826 (2022)
Abed-Alguni, B.H., et al.: A comparison study of cooperative Q-learning algorithms for independent learners. Int. J. Artif. Intell 14(1), 71–93 (2016)
Abed-Alguni, B.H., Alkhateeb, F.: Novel selection schemes for cuckoo search. Arab. J. Sci. Eng. 42(8), 3635–3654 (2017)
Abualigah, L., et al.: Reptile Search Algorithm (RSA): a nature-inspired meta-heuristic optimizer. Expert Syst. Appl. 191, 116158 (2022)
Jia, H., et al.: Crayfish optimization algorithm. Artif. Intell. Rev. 56(Suppl 2), 1919–1979 (2023)
Hubálovská, M., Hubálovský, Š, Trojovský, P.: Botox optimization algorithm: a new human-based metaheuristic algorithm for solving optimization problems. Biomimetics 9(3), 137 (2024)
Abed-alguni, B.H.: Bat Q-learning algorithm. Jordanian J. Comput. Inform. Technol. (JJCIT) 3(1), 56–77 (2017)
Ezugwu, A.E., et al.: Prairie dog optimization algorithm. Neural Comput. Appl. 34(22), 20017–20065 (2022)
Wolpert, D.H., Macready, W.G.: No free lunch theorems for search. Citeseer (1995).
Abualigah, L., et al.: Salp swarm algorithm: a comprehensive survey. Neural Comput. Appl. 32(15), 11195–11215 (2020)
Abed-Alguni, B.H., Paul, D.J.: Hybridizing the cuckoo search algorithm with different mutation operators for numerical optimization problems. J. Intell. Syst. 29(1), 1043–1062 (2019)
Shehab, M., et al.: Harris hawks optimization algorithm: variants and applications. Arch. Comput. Methods Eng. 29(7), 5579–5603 (2022)
Guerrero-Luis, M., Valdez, F., Castillo, G.: A review on the cuckoo search algorithm. In: Fuzzy Logic Hybrid Extensions of Neural and Optimization Algorithms: Theory and Applications, pp 113–124 (2021).
Abed-alguni, B.H., et al.: Exploratory cuckoo search for solving single-objective optimization problems. Soft. Comput. 25(15), 10167–10180 (2021)
Alkhateeb, F., Abed-Alguni, B.H.: A hybrid cuckoo search and simulated annealing algorithm. J. Intell. Syst. 28(4), 683–698 (2019)
Braik, M., et al.: White Shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 243, 108457 (2022)
Mafarja, M., et al.: Augmented whale feature selection for IoT attacks: Structure, analysis and applications. Futur. Gener. Comput. Syst. 112, 18–40 (2020)
Abed-alguni, B.H., Klaib, A.F.: Hybrid whale optimisation and β-hill climbing algorithm for continuous optimisation problems. Int. J. Comput. Sci. Math. 12(4), 350–363 (2020)
Gunduz, M., Aslan, M.: DJAYA: A discrete Jaya algorithm for solving traveling salesman problem. Appl. Soft Comput. 105, 107275 (2021)
Khodadadi, N., et al.: BAOA: binary arithmetic optimization algorithm with K-nearest neighbor classifier for feature selection. IEEE Access (2023).
Abualigah, L., et al.: The arithmetic optimization algorithm. Comput. Methods Appl. Mech. Eng. 376, 113609 (2021)
Alawad, N.A., Abed-alguni, B.H., Saleh, I.I.: Improved arithmetic optimization algorithm for patient admission scheduling problem. Soft Comput., pp 1–27 (2023).
Dhiman, G., et al.: BEPO: a novel binary emperor penguin optimizer for automatic feature selection. Knowl.-Based Syst. 211, 106560 (2021)
Khalid, O.W., Isa, N.A.M., Sakim, H.A.M.: Emperor penguin optimizer: a comprehensive review based on state-of-the-art meta-heuristic algorithms. Alex. Eng. J. 63, 487–526 (2023)
Sharma, S., Kumar, V., Dutta, K.: Multi‐objective prairie dog optimization algorithm for IoT‐based intrusion detection. Internet Technol. Lett. p. e516.
Murata, T., Ishibuchi, H.: MOGA: multi-objective genetic algorithms. in IEEE international conference on evolutionary computation. IEEE Piscataway (1995).
Dong, H., et al.: A novel hybrid genetic algorithm with granular information for feature selection and optimization. Appl. Soft Comput. 65, 33–46 (2018)
Maier, J.F., Eckert, C.M., Clarkson, P.J.: Model granularity in engineering design–concepts and framework. Des. Sci. 3, e1 (2017)
Arora, S., Singh, S.: Butterfly optimization algorithm: a novel approach for global optimization. Soft. Comput. 23, 715–734 (2019)
Tubishat, M., et al.: Dynamic butterfly optimization algorithm for feature selection. IEEE Access 8, 194303–194314 (2020)
Agrawal, R.K., Kaur, B., Sharma, S.: Quantum based Whale Optimization Algorithm for wrapper feature selection. Appl. Soft Comput. 89, 106092 (2020)
Abed-Alguni, B.H., Klaib, A.F., Nahar, K.M.: Island-based whale optimisation algorithm for continuous optimisation problems. Int. J. Reason.-Based Intell. Syst. 11(4), 319–329 (2019)
Goswami, N., et al.: Intrusion detection system for IoT-based Healthcare Intrusions with Lion-Salp-Swarm-Optimization Algorithm: metaheuristic-enabled hybrid intelligent approach. Eng. Sci. 25, 933 (2023)
Ghanbarzadeh, R., Hosseinalipour, A., Ghaffari, A.: A novel network intrusion detection method based on metaheuristic optimisation algorithms. J. Ambient. Intell. Humaniz. Comput. 14(6), 7575–7592 (2023)
Sanju, P.: Enhancing intrusion detection in IoT systems: A hybrid metaheuristics-deep learning approach with ensemble of recurrent neural networks. J. Eng. Res. 11(4), 356–361 (2023)
Stankovic, M., et al.: Feature selection by hybrid artificial bee colony algorithm for intrusion detection. in 2022 International Conference on Edge Computing and Applications (ICECAA). IEEE, New York (2022).
Bacanin, N., et al.: Intrusion detection by XGBoost model tuned by improved social network search algorithm. in International Conference on Modelling and Development of Intelligent Systems. Springer, Cham (2022).
Savanović, N., et al., Intrusion detection in healthcare 4.0 internet of things systems via metaheuristics optimized machine learning. Sustainability, 2023. 15(16): p. 12563.
Tawhid, M.A., Ibrahim, A.M.: Feature selection based on rough set approach, wrapper approach, and binary whale optimization algorithm. Int. J. Mach. Learn. Cybern. 11(3), 573–602 (2020)
Hijjawi, M., et al.: A Novel Hybrid Prairie Dog Algorithm and Harris Hawks Algorithm for Resource Allocation of Wireless Networks. IEEE Access, (2023).
Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51–67 (2016)
Abualigah, L., et al.: Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems. Multimedia Tools Appl., pp 1–41 (2023).
Agushaka, J.O., Ezugwu, A.E., Abualigah, L.: Dwarf mongoose optimization algorithm. Comput. Methods Appl. Mech. Eng. 391, 114570 (2022)
Abed-alguni, B.H., Barhoush, M.: Distributed grey wolf optimizer for numerical optimization problems. Jordanian J. Comput. Inf. Technol. (JJCIT) 4(03), 21 (2018)
Abed-alguni, B.H., Paul, D.: Island-based Cuckoo Search with elite opposition-based learning and multiple mutation methods for solving optimization problems. Soft. Comput. 26(7), 3293–3312 (2022)
Abed-Alguni, B.H., Paul, D., Hammad, R.: Improved Salp swarm algorithm for solving single-objective continuous optimization problems. Appl. Intell. 52(15), 17217–17236 (2022)
Abualigah, L., et al.: Opposition-based Laplacian distribution with Prairie Dog Optimization method for industrial engineering design problems. Comput. Methods Appl. Mech. Eng. 414, 116097 (2023)
Izci, D., Ekinci, S., Hussien, A.G.: Efficient parameter extraction of photovoltaic models with a novel enhanced prairie dog optimization algorithm. Sci. Rep. 14(1), 7945 (2024)
Tang, A., et al.: A chaos sparrow search algorithm with logarithmic spiral and adaptive step for engineering problems. CMES-Comp. Model. Eng. Sci. 130(1) (2022).
Aribowo, W., et al.: A novel hybrid prairie dog optimization algorithm-marine predator algorithm for tuning parameters power system stabilizer. J. Robot. Control (JRC) 4(5), 686–695 (2023)
Faramarzi, A., et al.: Marine predators algorithm: a nature-inspired metaheuristic. Expert Syst. Appl. 152, 113377 (2020)
Vatambeti, R., et al.: Prediction of DDoS attacks in agriculture 4.0 with the help of prairie dog optimization algorithm with IDSNet. Scientific Reports. 13(1), 15371 (2023).
Sherstinsky, A.: Fundamentals of Recurrent Neural Network (RNN) and Long Short-Term Memory (LSTM) network. Physica D 404, 132306 (2020)
Zitouni, F., et al.: APDO: A Hybrid Aquila Optimizer and Prairie Dog Optimization Metaheuristic Algorithm for Global, Optimization. In 2023 Computer Applications & Technological Solutions (CATS). IEEE, New York (2023).
Abualigah, L., et al.: Aquila optimizer: a novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 157, 107250 (2021)
Al-Betar, M.A., et al.: Cellular harmony search for optimization problems. J. Appl. Math. (2013).
Awadallah, M.A., Al-Betar, M.A., Doush, A.: cJAYA: Cellular JAYA algorithm. In: 2020 international conference on promising electronic technologies (ICPET). IEEE, New York (2020).
Awadallah, M.A., et al.: CCSA: cellular crow search algorithm with topological neighborhood shapes for optimization. Expert Syst. Appl. 194, 116431 (2022)
Al-Betar, M.A., et al.: Coronavirus herd immunity optimizer (CHIO). Neural Comput. Appl. 33(10), 5011–5042 (2021)
Al-Betar, M.A.: β-hill climbing: an exploratory local search. Neural Comput. Appl. 28(Suppl 1), 153–168 (2017)
Remeseiro, B., Bolon-Canedo, V.: A review of feature selection methods in medical applications. Comput. Biol. Med. 112, 103375 (2019)
Vandana, C., Chikkamannur, A.A.: Feature selection: an empirical study. Int. J. Eng. Trends Technol. 69(2), 165–170 (2021)
Solorio-Fernández, S., Carrasco-Ochoa, J.A., Martínez-Trinidad, J.F.: A review of unsupervised feature selection methods. Artif. Intell. Rev. 53(2), 907–948 (2020)
Khaire, U.M., Dhanalakshmi, R.: Stability of feature selection algorithm: a review. J. King Saud Univ.-Comp. Inform. Sci. 34(4), 1060–1073 (2022)
Lim, S.L.O., Pang, C.H., Hoon, G.K.: Cellular Automata for Evacuation Simulation. In 2019 IEEE Conference on Sustainable Utilization and Development in Engineering and Technologies (CSUDET). IEEE, New York (2019).
Ibrahimi, M.,:Logistic cellular automata. Bilkent Universitesi (Turkey) (2019).
Gao, Z.-M., Zhao, J., Li, S.-R.:The binary equilibrium optimization algorithm with sigmoid transfer functions. In: Proceedings of the 2020 12th International Conference on Machine Learning and Computing (2020).
Alawad, N.A., Abed-alguni, B.H.: Discrete island-based cuckoo search with highly disruptive polynomial mutation and opposition-based learning strategy for scheduling of workflow applications in cloud environments. Arab. J. Sci. Eng. 46(4), 3213–3233 (2021)
Imran, M., et al.: Intrusion detection in networks using cuckoo search optimization. Soft. Comput. 26(20), 10651–10663 (2022)
Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, New York (2015).
Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108–116 (2018)
Paiva, F.A., et al.: Modified bat algorithm with cauchy mutation and elite opposition-based learning. In: 2017 IEEE Latin American conference on computational intelligence (LA-CCI). IEEE, New York (2017).
Abed-alguni, B.H.: Action-selection method for reinforcement learning based on cuckoo search algorithm. Arab. J. Sci. Eng. 43(12), 6771–6785 (2018)
Alawad, N.A., Abed-Alguni, B.H., El-Ibini, M.: Hybrid snake optimizer algorithm for solving economic load dispatch problem with valve point effect. J. Supercomput., pp 1–50 (2024).
Park, S.M., Kamondetdacha, R., Nyenhuis, J.A.: Calculation of MRI-induced heating of an implanted medical lead wire with an electric field transfer function. J. Magn. Resonan. Imag. Offic. J. Int. Soc. Magn. Resonan. Med. 26(5), 1278–1285 (2007)
Mirjalili, S., Lewis, A.: S-shaped versus V-shaped transfer functions for binary particle swarm optimization. Swarm Evol. Comput. 9, 1–14 (2013)
Thejas, G., et al.: Metric and accuracy ranked feature inclusion: Hybrids of filter and wrapper feature selection approaches. IEEE Access 9, 128687–128701 (2021)
Alawad, N.A., Abed-alguni, B.H.: Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem. J. Supercomput. 78(3), 3517–3538 (2022)
Tubishat, M., et al.: Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst. Appl. 145, 113122 (2020)
Lim, T.Y., Al-Betar, M.A., Khader, A.T.: Taming the 0/1 knapsack problem with monogamous pairs genetic algorithm. Expert Syst. Appl. 54, 241–250 (2016)
Zhao, J., et al.: An improved binary cuckoo search algorithm for solving unit commitment problems: methodological description. IEEE Access 6, 43535–43545 (2018)
Abed-Alguni, B.H., Alawad, N.A.: Distributed Grey Wolf Optimizer for scheduling of workflow applications in cloud environments. Appl. Soft Comput. 102, 107113 (2021)
Abed-alguni, B.H., et al.: A multi-agent cooperative reinforcement learning model using a hierarchy of consultants, tutors and workers. Vietnam J. Comp. Sci. 2, 213–226 (2015)
Abed-alguni, B.H., Paul, D.: Island-based cuckoo search with elite opposition-based learning and multiple mutation methods for solving discrete and continuous optimization problems. (2021).
Abed-alguni, B.H.: Island-based cuckoo search with highly disruptive polynomial mutation. Int. J. Artif. Intell. 17(1), 57–82 (2019)
Funding
No funds, grants, or other support were received.
Author information
Authors and Affiliations
Contributions
B.A: Conceptualization, Investigation, Methodology, Supervision, Visualization, Writing—original draft, Writing—review & editing. B. Z.: Conceptualization, Investigation, Software, Validation, Visualization. N. A.: Methodology, Investigation, Software, Validation, Visualization, Writing—review & editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Abed-alguni, B.H., Alzboun, B.M. & Alawad, N.A. BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm. Cluster Comput 27, 14417–14449 (2024). https://doi.org/10.1007/s10586-024-04674-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-024-04674-2