Skip to main content
Log in

Hyper-heuristic multi-objective online optimization for cyber security in big data

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The tremendous growth in data inside the Big data era has created data management challenges as well as data security concerns. These large data cyber security challenges can be successfully addressed with AI computations, with the SVM providing the best results on big data order issues. Master information in picking the kernel work and different boundaries is required to characterize the correct design of the SVM, and this can significantly advance its arrangement outcomes. The fake positive rate, bogus negative rate, and model unpredictability boundaries addressed using the SVM arrangement process is shown to be a multi-objective optimization problem in this study. The hyper-heuristic online particle swarm optimization (HHOPSO) computation with the SVM multi-objective optimization problem, a hyper-heuristic online particle swarm optimization system is produced was presented. The hyper-heuristic system comprises a high-level technique for directing the search process for determining low-level heuristics, and the low-level heuristics build new SVM setup configurations using various PSO standards. The proposed HHOPSO was evaluated on two cyber security datasets i.e., NSL-KDD and ISCX-IDS. The results revealed that the suggested approach is more effective than other calculations in refining the order of big data cyber security issues. The designed HHOPSO can classify cyber-attacks like DoS, Probe, R2L, and U2R with an accuracy of 93.23%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Basgalupp MP, Barros RC, da Silva TS, de Carvalho ACPLF (2013) Software effort prediction: a hyper-heuristic decision-tree based approach. In: Proceedings of the 28th annual ACM symposium on applied computing, pp 1109–1116

  • Calvert CL, Khoshgoftaar TM (2019) Impact of class distribution on the detection of slow HTTP DoS attacks using Big Data. J Big Data 6(1):67

    Article  Google Scholar 

  • Ch R, Gadekallu TR, Abidi MH, Al-Ahmari A (2020) Computational system to classify cyber crime offenses using machine learning. Sustainability 12(10):4087. https://doi.org/10.3390/su12104087

    Article  Google Scholar 

  • Chen M, Mao S, Liu Y (2014) Big data: a survey. Mob Netw Appl 19(2):171–209

    Article  Google Scholar 

  • Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Archit 97:1–7

    Article  Google Scholar 

  • Egele M, Scholte T, Kirda E, Kruegel C (2012) A survey on automated dynamic malware-analysis techniques and tools. ACM Comput Surv 44(2):1–42

    Article  Google Scholar 

  • Filiol E, Jacob G, Le Liard M (2007) Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J Comput Virol 3(1):23–37

    Article  Google Scholar 

  • Ghankutkar S, Sarkar N, Gajbhiye P, Yadav S, Kalbande D, Bakereywala N (2019) Modelling machine learning for analysing crime news. In: International conference on advances in computing, communication and control (ICAC3)

  • Greer K (2012) A stochastic hyperheuristic for unsupervised matching of partial information. Adv Artif Intell. https://doi.org/10.1155/2012/790485

    Article  Google Scholar 

  • Ju A, Guo Y, Ye Z, Li T, Ma J (2019) Hete MSD: a big data analytics framework for targeted cyber-attacks detection using heterogeneous multisource data. Secur Commun Netw. https://doi.org/10.1155/2019/5483918

    Article  Google Scholar 

  • Mao W, Cai Z, Yang Y, Shi X, Guan X (2018) From big data to knowledge: a spatio-temporal approach to malware detection. Comput Secur 74:167–183

    Article  Google Scholar 

  • Moorthy RS, Pabitha P (2020) Optimal detection of phising attack using SCA based K-NN. Procedia Comput Sci 171(5):1716–1725. https://doi.org/10.1016/j.procs.2020.04.184

    Article  Google Scholar 

  • Obaid AJ (2021) Multiple objective effect analysis to monitor the sustainability for the refurbishment of ecosystem. Int J Innov Sci Eng Res IJISER 8(3):81–88

    Google Scholar 

  • Ortiz-Bayliss JC, Terashima-Marín H, Conant-Pablos SE (2013) Learning vector quantization for variable ordering in constraint satisfaction problems. Pattern Recognit Lett 34(4):423–432

    Article  Google Scholar 

  • Sabar NR, Abawajy J, Yearwood J (2017) Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems. IEEE Trans Evol Comput 21(2):315–327

    Article  Google Scholar 

  • Sabar NR, Yi X, Song A (2018) A bi-objective hyper-heuristic support vector machines for big data cyber-security. IEEE Access 6:10421–10431

    Article  Google Scholar 

  • Shamshirband S, Chronopoulos AT (2019) A new malware detection system using a high performance-ELM method. In: Proceedings of the 23rd international database applications and engineering symposium. ACM

  • Sim K, Hart E, Paechter B (2012) A hyper-heuristic classifier for one dimensional bin packing problems: improving classification accuracy by attribute evolution. In: Coello CA, Coello VC, Deb K, Forrest S, Nicosia G, Pavone M (eds) Parallel problem solving from nature—PPSN XII (Lecture Notes in Computer Science). Springer, Berlin

    Google Scholar 

  • Suthaharan S (2014) Big data classification: problems and challenges in network intrusion prediction with machine learning. SIGMETRICS Perform Eval Rev 41(4):70–73

    Article  Google Scholar 

  • Thalluri LN, Venkat SN, Prasad CVVD, Kumar DV, Kumar KP, Narayana Sarma AVSY, Adapa SD (2021) Artificial intelligence enabled smart city IoT system using edge computing. In: International conference on smart electronics and communication (ICOSEC). https://doi.org/10.1109/ICOSEC51865.2021.9591732

  • Thalluri LN, Bommu S, Rao SM, Rao KS, Guha K, Kiran SS (2022) Target application based design approach for RF MEMS switches using artificial neural networks. Trans Electr Electron Mater. https://doi.org/10.1007/s42341-021-00378-1

    Article  Google Scholar 

  • Tsai C-W, Lai C-F, Chao H-C, Vasilakos AV (2015) Big data analytics: a survey. J Big Data 2(1):21

    Article  Google Scholar 

  • Venkatraman S, Alazab M, Vinayakumar R (2019) A hybrid deep learning image-based analysis for effective malware detection. J Inf Secur Appl 47:377–389

    Google Scholar 

  • Ye Y et al (2011) Combining file content and file relations for cloud based malware detection. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery data mining, pp 222–230

  • Ye Y, Li T, Adjeroh D, Iyengar SS (2017) A survey on malware detection using data mining techniques. ACM Comput Surv 50(3):1–40

    Article  Google Scholar 

Download references

Funding

All authors report no external funding for this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Ahmed.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, M., Babu, G.R.M. Hyper-heuristic multi-objective online optimization for cyber security in big data. Int J Syst Assur Eng Manag 15, 314–323 (2024). https://doi.org/10.1007/s13198-022-01727-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-022-01727-w

Keywords

Navigation