skip to main content
10.1145/3647444.3647913acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

A Survey of Swarm Intelligence Based Clustering Models for Anomaly Detection in Network Traffic

Published: 13 May 2024 Publication History

Abstract

Data is always at risk of being compromised in the age of the industrial Internet of Things (IoT) irrespective of the fact that whether it is at rest or in transit. Authentication and encryption are employed in IoT networks but it does not make them immune to Cyber threats. Although there are many data-safety options, not all of them are perfect. In this context, anomaly detection acts as an aid in improving the resistance of the systems to various forms of attacks. In order to achieve it, several data mining algorithms and tools are used to detect and record any unusual network activity. Thus, intrusion detection has become a crucial part of network security as frequency of Cyber-attacks on computers continues to rise. The surge in attacks is due to the exponential growth in the availability and accessibility of the Internet and other forms of digital information dissemination. Nowadays, Intrusion Detection Systems (IDS) are a regular component of almost all security networks. The efficacy of IDS has already seen a number of improvements, mostly due to the use of evolutionary methods. An evolutionary algorithm named Swarm intelligence (SI) has attracted the attention of researchers in the field of intrusion detection because of its successful use in other domains. SI is a new bio-inspired family of technologies that takes cues from the coordinated actions of animal or insect swarms. The combination of SI and data mining has produced lightweight yet robust approaches for detecting Cyber-attacks. The study presented in this paper mainly pursues following objectives; Our first objective in this study is to critically examine existing swarm-based anomaly detection techniques, while also contributing fresh insights to the existing body of literature surrounding anomaly detection research in swarm-based data mining. To achieve this, we conduct a comprehensive review of the existing swarm intelligence-based clustering models utilized for anomaly detection in network traffic. Our analysis illuminates the strengths and weaknesses of these models, notably highlighting their efficacy in pinpointing anomalies within network traffic. Furthermore, we delve into the challenges encountered during the implementation of these swarm intelligence-based clustering models within network traffic anomaly detection scenarios, while concurrently proposing potential solutions to address these issues.

References

[1]
Li, Yuchong & Liu, Qinghui. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports. 7. 10.1016/j.egyr.2021.08.126.
[2]
Chopra, D., Arora, P. (n.d.). Swarm Intelligence in Data Science: Challenges, Opportunities and Applications. Paper presented at the 4th International Conference on Innovative Data Communication Technology and Application. 2022.
[3]
Gyamfi, E.; Jurcut, A. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 2022, 22, 3744.
[4]
Yang, J. (2020). Swarm Intelligence in Data Science: Applications, Opportunities and Challenges. In: Tan, Y., Shi, Y., Tuba, M. (eds) Advances in Swarm Intelligence. ICSI 2020. Lecture Notes in Computer Science (), vol 12145. Springer, Cham.
[5]
Dorigo, M., & Stützle, T. (2010). Ant Colony Optimization: Overview and Recent Advances. In Gendreau, M., & Potvin, J. Y. (Eds.), Handbook of Metaheuristics (pp. 227-263). Springer.
[6]
Dorigo, M., Maniezzo, V., & Colorni, A. (1996). Ant System: Optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 26(1), 29-41.
[7]
Fister, I., Fister, I. Jr., & Yang, X. S. (2013). A comprehensive review of firefly algorithms. Swarm and Evolutionary Computation, 13, 34-46.
[8]
Karaboga, D., & Basturk, B. (2007). A powerful and efficient algorithm for numerical function optimization: Artificial bee colony (ABC) algorithm. Journal of Global Optimization, 39(3), 459-471.
[9]
Kennedy, J., & Eberhart, R. (1995). Particle swarm optimization. In Proceedings of IEEE International Conference on Neural Networks (Vol. 4, pp. 1942-1948). IEEE.
[10]
Passino, K. M. (2002). Biomimicry of bacterial foraging for distributed optimization and control. IEEE Control Systems Magazine, 22(3), 52-67.
[11]
Wang, G. G., Guo, L., Duan, H., Wang, H., & Liu, L. (2014). A new improved cuckoo search algorithm for 0-1 knapsack problems. Mathematical Problems in Engineering, 2014, 1-11.
[12]
Yang, X. S. (2010). A new metaheuristic bat-inspired algorithm. In Nature Inspired Cooperative Strategies for Optimization (NICSO 2010) (pp. 65-74). Springer.
[13]
Yang, X. S., & Deb, S. (2009). Cuckoo search via Lévy flights. In 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC) (pp. 210-214). IEEE.
[14]
Yang, X. S., & Deb, S. (2010). Engineering optimisation by cuckoo search. International Journal of Mathematical Modelling and Numerical Optimisation, 1(4),
[15]
Zhang, W. J. (2017). Hybrid swarm intelligence optimization algorithms. In Handbook of Swarm Intelligence (pp. 181-207). Springer.
[16]
Zhang, Y., Wang, S., & Ji, G. (2008). A comprehensive survey on particle swarm optimization algorithm and its applications. Mathematical Problems in Engineering, 2008, 1-38.
[17]
Elmogy, A.; Rizk, H.; Sarhan, A.M. OFCOD: On the Fly Clustering Based Outlier Detection Framework. Data 2021, 6, 1.
[18]
J. Tang, G. Liu and Q. Pan, "A Review on Representative Swarm Intelligence Algorithms for Solving Optimization Problems: Applications and Trends," in IEEE/CAA Journal of Automatica Sinica, vol. 8, no. 10, pp. 1627-1643, October 2021
[19]
Fotiadou, K.; Velivassaki, T.-H.; Voulkidis, A.; Skias, D.; Tsekeridou, S.; Zahariadis, T. Network Traffic Anomaly Detection via Deep Learning. Information 2021, 12, 215.
[20]
P. Amudha, S. Karthik, S. Sivakumari, "A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features", The Scientific World Journal, vol. 2015, Article ID 574589, 15 pages, 2015.
[21]
Khilar, Rashmita & Mariyappan, Kandasamy & Christo, Mary Subaja & Joyson, Amutharaj & T, Anitha & Thavasimuthu, Rajendran. (2021). A Hybrid Network Anomaly Detection system using Glowworm Swarm Optimization with Principal Component Analysis. 10.21203/rs.3.rs-408246/v1.
[22]
Y.-H. Dai and R. Fletcher, “Projected barzilai-borwein methods for large-scale box-constrained quadratic programming,” Numerische Mathematik, vol. 100, 2005.
[23]
Cemerlic, Alma & Yang, Li & Kizza, Joseph. (2008). Network Intrusion Detection Based on Bayesian Networks. 791-794.
[24]
Q. Ma, C. Sun, B. Cui, and X. Jin, “A novel model for anomaly detection in network traffic based on kernel support vector machine,” Computers & Security, vol. 104, 2021.
[25]
C. Pascoal, M. R. De Oliveira, R. Valadas, P. Filzmoser, P. Salvador, and A. Pacheco, “Robust feature selection and robust PCA for internet traffic anomaly detection,” in Proceedings of the 2012 Proceedings IEEE Infocom, pp. 1755–1763, IEEE, Orlando, FL, USA, March 2012.
[26]
Ren, Huorong & Ye, Zhixing & Li, Zhiwu. (2017). Anomaly detection based on a dynamic Markov model. Information Sciences. 411. 10.1016/j.ins.2017.05.021.
[27]
C. Sinclair, L. Pierce, and S. Matzner, “An application of machine learning to network intrusion detection,” in Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC’99), pp. 371–377, IEEE, Phoenix, ARI, USA, December 1999.
[28]
T. Shon and J. Moon, “A hybrid machine learning approach to network anomaly detection,” Information Sciences, vol. 177, no. 18, pp. 3799–3821, 2007.
[29]
K. M. Al-Gethami, M. T. Al-Akhras, and M. Alawairdhi, “Empirical evaluation of noise influence on supervised machine learning algorithms using intrusion detection datasets,” Security and Communication Networks, vol. 2021, Article ID 8836057, 28 pages, 2021.
[30]
Singh, U. P., Saxena, V., Kumar, A., Bhari, P., & Saxena, D. (2022, December). Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[31]
Kumar, A., Bhari, P. L., Singh, U. P., & Saxena, V. (2022, December). Comparative Study of different Machine Learning Algorithms to Analyze Sentiments with a Case Study of Two Person's Microblogs on Twitter. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp.1-6).
[32]
Saxena, V., Saxena, D., & Singh, U. P. (2022, December). Security Enhancement using Image verification method to Secure Docker Containers. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[33]
Chauhan, M., Malhotra, R., Pathak, M., & Singh, U. P. (2012). Different aspects of cloud security. International Journal of Engineering Research and Applications, 2, 864-869.
[34]
Mittal, A. K., Singh, U. P., Tiwari, A., Dwivedi, S., Joshi, M. K., & Tripathi, K. C. (2015). Short-term predictions by statistical methods in regions of varying dynamical error growth in a chaotic system. Meteorology and Atmospheric Physics, 127, 457-465.
[35]
Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2015). Predictability study of forced Lorenz model: an artificial neural network approach. History, 40(181), 27-33.
[36]
Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2020). Evaluating the predictability of central Indian rainfall on short and long timescales using theory of nonlinear dynamics. Journal of water and Climate Change, 11(4), 1134-1149.
[37]
Singh, U., Pathak, M., Malhotra, R., & Chauhan, M. (2012). Secure communication protocol for ATM using TLS handshake. Journal of Engineering Research and Applications (IJERA), 2(2), 838-948.
[38]
Singh, U. P., & Mittal, A. K. (2021). Testing reliability of the spatial Hurst exponent method for detecting a change point. Journal of Water and Climate Change, 12(8), 3661-3674.
[39]
Tiwari, A., Mittal, A. K., Dwivedi, S., & Singh, U. P. (2015). Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model. Climate Change, 1(4), 411-417.
[40]
C. Zhang, Y. Chen, Y. Meng, “A novel framework design of network intrusion detection based on machine learning techniques,” Security and Communication Networks, vol. 2021, Article ID 6610675, 15 pages, 2021.
[41]
A. A. Amaral, L. d. S. Mendes, B. B. Zarpelão, and M. L. P. Junior, “Deep IP flow inspection to detect beyond network anomalies,” Computer Communications, vol. 98, pp. 80–96, 2017.
[42]
Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi, "Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset" 2002
[43]
Penmatsa, Ravi Kiran Varma & Vatsavayi, Valli Kumari & Kumar, S. (2016). Feature Selection Using Relative Fuzzy Entropy and Ant Colony Optimization Applied to Real-time Intrusion Detection System. Procedia Computer Science. 85. 503-510. 10.1016/j.procs.2016.05.203.
[44]
Guohong Qi, Jie Zhou, Wenxian Jia, Menghan Liu, Shengnan Zhang, Mengying Xu, "Intrusion Detection for Network Based on Elite Clone Artificial Bee Colony and Back Propagation Neural Network", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9956371, 11 pages, 2021.
[45]
Almomani, O. A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms. Symmetry 2020, 12, 1046.
[46]
Imran, Muhammad & Khan, Sangeen & Hlavacs, Helmut & Khan, Fakhri & Anwar, Sajid. (2022). Intrusion detection in networks using cuckoo search optimization. Soft Computing.
[47]
Pham, Viet & C. Nguyen, Dinh & Mirjalili, Seyedali & Dinh Thai, Hoang & Nguyen, Diep & Pathirana, Pubudu & Hwang, won-Joo. (2021). Swarm intelligence for next-generation networks: Recent advances and applications. Journal of Network and Computer Applications.
[48]
R. Patil Rashmi, Y. Gandhi, V. Sarmalkar, P. Pund and V. Khetani, "RDPC: Secure Cloud Storage with Deduplication Technique," 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2020, pp. 1280-1283.

Cited By

View all
  • (2024)A Dual Transformer-Based Deep Learning Model for Passenger Anomaly Behavior Detection in Elevator CabsInternational Journal of Swarm Intelligence Research10.4018/IJSIR.36157815:1(1-14)Online publication date: 22-Nov-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ant colony optimization
  2. clustering
  3. deep learning
  4. online anomaly detection
  5. particle swarm optimization

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Dual Transformer-Based Deep Learning Model for Passenger Anomaly Behavior Detection in Elevator CabsInternational Journal of Swarm Intelligence Research10.4018/IJSIR.36157815:1(1-14)Online publication date: 22-Nov-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media