Abstract
For a number of years, due to exponential increase in the demand for sustainable environment, suspicious activities have recently been identified as over-serious threats that are continually processing and growing. Identifying suspicious activities in the domain of cyber security is considered as a growing concern of research. To deal with suspicious threats, network requires traffic surveillance accompanied by beardown security policies. In order to handle data outflow, spoofing, disruption of service, energy exploiting, and insecure gateways range of attacks issues, the existing intrusion detection systems (IDSs) have observed to be less efficient as many of them are not able to detect anomalies with the change in the definition of the attack. To build a protected system against various cyber-attacks in computer networks, in this study, we introduce a multi-parallel adaptive evolutionary technique to utilize adaptation mechanism in the group of swarms for network intrusion detection. After that, simulated annealing is incorporated into multi-parallel adaptive grasshopper optimization technique to further improve the agent quality of individual after each iteration. It has revolutionized in the recent era for efficient threat detection with great performance in a certain time limit. The simulations are performed on three IDS datasets such as NSL-KDD, AWID-ATK-R, and NGIDS-DS. The proposed technique is compared with various existing techniques using different evaluation metrics. The comparative analysis demonstrates that the applicability of proposed technique concerning its merits outperforms the others algorithms.








Similar content being viewed by others
References
Prasad, R. (2004). OFDM for wireless communications systems. Norwood: Artech House.
Ghazy, R. A., El-Rabaie, E.-S.M., Dessouky, M. I., El-Fishawy, N. A., & Abd El-Samie, F. E. (2020). Feature selection ranking and subset-based techniques with different classifiers for intrusion detection. Wireless Personal Communications, 111(1), 375–393.
Xie, Y., Feng, D., Hu, Y., Li, Y., Sample, S., & Long, D. (2018). Pagoda: A hybrid approach to enable efficient real-time provenance based intrusion detection in big data environments. IEEE Transactions on Dependable and Secure Computing, 17, 1283.
Prasad, R., & Rohokale, V. (2020). Artificial intelligence and machine learning in cyber security. In Cyber Security: The Lifeline of Information and Communication Technology (pp. 231–247). Springer.
Jing, X., Yan, Z., Jiang, X., & Pedrycz, W. (2019). Network traffic fusion and analysis against ddos flooding attacks with a novel reversible sketch. Information Fusion, 51, 100–113.
Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
Prasad, R., & Rohokale, V. (2020). Cyber security: The lifeline of information and communication Technology. Berlin: Springer.
Dwivedi, S., Vardhan, M., Tripathi, S., & Shukla, A. K. (2020). Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evolutionary Intelligence, 13(1), 103–117.
Shunmugapriya, P., & Kanmani, S. (2017). A hybrid algorithm using ant and bee colony optimization for feature selection and classification (ac-abc hybrid). Swarm and Evolutionary Computation, 36, 27–36.
Shukla, A. K. (2019). Building an effective approach toward intrusion detection using ensemble feature selection. International Journal of Information Security and Privacy (IJISP), 13(3), 31–47.
Zawbaa, H. M., Emary, E., Grosan, C., & Snasel, V. (2018). Large-dimensionality small-instance set feature selection: A hybrid bio-inspired heuristic approach. Swarm and Evolutionary Computation, 42, 29–42.
Shukla, A. K., Pippal, S. K., & Chauhan, S. S. (2019). An empirical evaluation of teaching-learning-based optimization, genetic algorithm and particle swarm optimization. International Journal of Computers and Applications, 1, 15.
Stephanakis, I. M., Chochliouros, I. P., Sfakianakis, E., Shirazi, S. N., & Hutchison, D. (2019). Hybrid self-organizing feature map (som) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences, 494, 247–277.
Shukla, A. K., Pippal, S. K., Gupta, S., Ramachandra Reddy, B., & Tripathi, D. (2020). Knowledge discovery in medical and biological datasets by integration of relief-f and correlation feature selection techniques. Journal of Intelligent & Fuzzy Systems, 1, 1–12.
Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Computer Networks, 176, 1072510725.
Malik, A. J., & Khan, F. A. (2018). A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Cluster Computing, 21(1), 667–680.
Saremi, S., Mirjalili, S., & Lewis, A. (2017). Grasshopper optimisation algorithm: Theory and application. Advances in Engineering Software, 105, 30–47.
Mirjalili, S. Z., Mirjalili, S., Saremi, S., Faris, H., & Aljarah, I. (2018). Grasshopper optimization algorithm for multi-objective optimization problems. Applied Intelligence, 48(4), 805–820.
Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Defense against distributed dos attack detection by using intelligent evolutionary algorithm. International Journal of Computers and Applications, 43, 1–11.
Alazzam, H., Sharieh, A., & Sabri, K. E. (2020). A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Systems with Applications, 148, 113249.
Xiong, H., Qiu, B., & Liu, J. (2020). An improved multi-swarm particle swarm optimizer for optimizing the electric field distribution of multichannel transcranial magnetic stimulation. Artificial Intelligence in Medicine, 104, 101790.
Jamali, S., & Shaker, G. (2012). Pso-sfdd: Defense against syn flooding dos attacks by employing pso algorithm. Computers & Mathematics with Applications, 63(1), 214–221.
Arora, S., & Anand, P. (2018). Chaotic grasshopper optimization algorithm for global optimization. Neural Computing and Applications, 31, 1–21.
Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, 76, 1–38.
Chen, H., Li, S., Heidari, A. A., Wang, P., Li, J., Yang, Y., Wang, M., & Huang, C. (2020). Efficient multi-population outpost fruit fly-driven optimizers: Framework and advances in support vector machines. Expert Systems with Applications, 142, 112999.
Wang, M., & Chen, H. (2020). Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis. Applied Soft Computing, 88, 105946.
de Campos Jr, A., Pozo, A. T., & Duarte, E. P., Jr. (2019). Parallel multi-swarm pso strategies for solving many objective optimization problems. Journal of Parallel and Distributed Computing, 126, 13–33.
Chen, H., Heidari, A. A., Zhao, X., Zhang, L., & Chen, H. (2020). Advanced orthogonal learning-driven multi-swarm sine cosine optimization: Framework and case studies. Expert Systems with Applications, 144, 113113.
Zhang, Y., Liu, X., Bao, F., Chi, J., Zhang, C., & Liu, P. (2020). Particle swarm optimization with adaptive learning strategy. Knowledge-Based Systems, 196, 105789.
Selvakumar, K., Karuppiah, M., SaiRamesh, L., Islam, S. H., Hassan, M. M., Fortino, G., & Choo, K.-K.R. (2019). Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in wsns. Information Sciences, 497, 77–90.
Ambusaidi, M. A., He, X., & Nanda, P. (2015). Unsupervised feature selection method for intrusion detection system. In 2015 IEEE Trustcom/BigDataSE/ISPA (Vol. 1, pp. 295–301). IEEE.
Raman, M. G., Somu, N., Kirthivasan, K., Liscano, R., & Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based Systems, 134, 1–12.
Hoang, T.-H., et al. (2018). Detect wi-fi network attacks using parallel genetic programming. In 2018 10th International Conference on Knowledge and Systems Engineering (KSE) (pp. 370–375). IEEE.
Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security and Applications, 44, 80–88.
Haider, W., Moustafa, N., Keshk, M., Fernandez, A., Choo, K.-K.R., & Wahab, A. (2020). Fgmc-hads: Fuzzy gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. Computers & Security, 96, 101906.
Lv, L., Wang, W., Zhang, Z., & Liu, X. (2020). A novel intrusion detection system based on an optimal hybrid kernel extreme learning machine. Knowledge-Based Systems, 195, 105648.
Rizzi, A., Granato, G., & Baiocchi, A. (2020). Frame-by-frame wi-fi attack detection algorithm with scalable and modular machine-learning design. Applied Soft Computing, 91, 106188.
Zakeri, A., & Hokmabadi, A. (2019). Efficient feature selection method using real-valued grasshopper optimization algorithm. Expert Systems with Applications, 119, 61–72.
Mafarja, M., Aljarah, I., Faris, H., Hammouri, A. I., AlaaM, A.-Z., & Mirjalili, S. (2019). Binary grasshopper optimisation algorithm approaches for feature selection problems. Expert Systems with Applications, 117, 267–286.
Fathy, A. (2018). Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded pv array. Solar Energy, 171, 638–651.
Cheng, C., Tay, W. P., & Huang, G.-B. (2012). Extreme learning machines for intrusion detection. In The 2012 International joint conference on neural networks (IJCNN) (pp. 1–8). IEEE.
Li, C., & Wu, T. (2011). Adaptive fuzzy approach to function approximation with pso and rlse. Expert Systems with Applications, 38, 13266–13273.
Xia, X., Gui, L., & Zhan, Z.-H. (2018). A multi-swarm particle swarm optimization algorithm based on dynamical topology and purposeful detecting. Applied Soft Computing, 67, 126–140.
Karami, A. (2018). An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities. Expert Systems with Applications, 108, 36–60.
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009). A detailed analysis of the kdd cup 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications (pp. 1–6). IEEE.
Wang, H., Gu, J., & Wang, S. (2017). An effective intrusion detection framework based on svm with feature augmentation. Knowledge-Based Systems, 136, 130–139.
Abdulhammed, R., Faezipour, M., Abuzneid, A., & Alessa, A. (2018). Enhancing wireless intrusion detection using machine learning classification with reduced attribute sets. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC) (pp. 524–529). IEEE.
Haider, W., Hu, J., Slay, J., Turnbull, B. P., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of Network and Computer Applications, 87, 185–192.
Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). Kdd cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41–51.
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.
Garg, S., Kaur, K., Batra, S., Aujla, G. S., Morgan, G., Kumar, N., Zomaya, A. Y., & Ranjan R. (2020). En-abc: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. Journal of Parallel and Distributed Computing, 135, 219–233.
Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computational Science, 25, 152–160.
Jyothsna, V., & Prasad, V. R. (2016). Fcaais: Anomaly based network intrusion detection through feature correlation analysis and association impact scale. ICT Express, 2(3), 103–116.
Mazini, M., Shirazi, B., & Mahdavi, I. (2018). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. Journal of King Saud University-Computer and Information Sciences, 31, 541.
Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Systems with Applications, 41(4), 1690–1700.
Nahiyan, K., Kaiser, S., Ferens, K., & McLeod, R. (2017). A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In Proceedings of the 2017 International Conference on Applied Cognitive Computing (ACC’17).
Vijayakumar, D. S., & Ganapathy, S. (2018). Machine learning approach to combat false alarms in wireless intrusion detection system. Computer and Information Science, 11(3), 67–81.
Kasongo, S. M., & Sun, Y. (2020). A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Computers & Security, 92, 101752.
Davahli, A., Shamsi, M., & Abaei, G. (2020). Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for iot wireless networks. Journal of Ambient Intelligence and Humanized Computing, 11, 5581.
Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2015). Intrusion detection in 80.211 networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), 184–208.
Zhou, Y., Cheng, G., Jiang, S., & Dai, M. (2020). Building an efficient intrusion detection system based on feature selection and ensemble classifier. Computer Networks, 174, 107247.
Haider, W., Hu, J., Xie, Y., Yu, X., & Wu, Q. (2017). Detecting anomalous behavior in cloud servers by nested arc hidden semi-markov model with state summarization. IEEE Transactions on Big Data, 5, 3.
Haider, W., Hu, J., & Moustafa, N. (2017). Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning. In International Conference on Mobile Networks and Management (pp. 137–149). Springer.
Tran, N. N., Sarker, R., & Hu, J. (2017). An approach for host-based intrusion detection system design using convolutional neural network. In International Conference on Mobile Networks and Management (pp. 116–126). Springer.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that no conflicts of interest.
Ethical approval
This study was performed using available datasets, as per my compliance with ethical standards there were no human or animal participants and therefore the study did not require ethics approval.
Research involving human and animal participants
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dwivedi, S., Vardhan, M. & Tripathi, S. Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks. Wireless Pers Commun 119, 2787–2816 (2021). https://doi.org/10.1007/s11277-021-08368-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08368-5