Skip to main content
Log in

Binary improved white shark algorithm for intrusion detection systems

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure Internet applications and networks from malicious actors. The main shortcoming of the current Intrusion Detection Systems (IDSs) is their attack detection performance because the existing solutions fail to detect the threats efficiently. Therefore, improving the prediction model of the IDS can improve its performance. Several studies suggest improving the Machine Learning (ML)-based IDS prediction models by selecting the most informative features from the security data before utilizing it in the ML-IDS model. Thus, meta-heuristic algorithms such as White Shark Optimizer (WSO) are adapted to deal with such feature selection problems. For the IDS prediction model, in this paper, the WSO algorithm is improved to cope with the binary domain of the feature selection task as follows: Firstly, two transfer functions are used to map the continuous domain into binary. Secondly, the modified K-means algorithm is proposed to assess building the initial population with a high level of diversity. Finally, several crossover operators are utilized to improve the evolution process of the binary WSO. The three improved versions are BIWSO1 which is WSO with transfer functions, BIWSO2, which is BIWSO1 with a modified k-means algorithm, and BIWSO3, which is BIWSO2 with crossover operators. The proposed versions of BIWSO are tested using twelve public real-world IDS and IoT datasets. Comparative evaluations against well-established meta-heuristic algorithms are conducted where the BIWSO3 proves its efficiency in terms of classification accuracy, precision, recall, and F1 measurements. For further validation, statistical evidence using Friedman’s, Wilcoxon’s, and Mann–Whitney U tests has been conducted where BIWSO3 proves its performance at a remarkably significant level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

The datasets generated during and/or analyzed during the current study are available in the CIC-IDS2017, https://www.unb.ca/cic/datasets/ids-2017.html, Bot-IoT, https://www.unb.ca/cic/datasets/ids-2017.html, NSL-KDD, http://www.di.uniba.it, KDDCup-99, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, CICDDOS2019, https://www.unb.ca/cic/datasets/ddos-2019.html, CSE-CIC-IDS2018, https://www.unb.ca/cic/datasets/ids-2018.html, Intrusion detection 2018, https://github.com/tamerthamoqa/cic-ids-2018-intrusion-detection-classification, CIRA-CICDosHBrw-2020U, https://www.unb.ca/cic/datasets/dohbrw-2020.html, UNSW-NB15, https://paperswithcode.com/dataset/unsw-nb15, CIC-MalMem-2022, https://www.unb.ca/cic/datasets/malmem-2022.html, Phishing Legimate, https://www.kaggle.com/datasets, LUFlow Network, https://www.kaggle.com/datasets.

References

  1. Rose K, Eldridge S, Chapin L (2015) The internet of things: an overview. Internet Soc(ISOC) 80:1–50

    Google Scholar 

  2. Grigaliunas S, Toldinas J, Venckauskas A, Morkevicius N, Damaševičius R (2021) Digital evidence object model for situation awareness and decision making in digital forensics investigation. IEEE Intell Syst 36(5):39–48

    Google Scholar 

  3. Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247

    Google Scholar 

  4. Scarfone K, Mell P et al (2007) Guide to intrusion detection and prevention systems (idps). NIST Spec Publ 800(2007):94

    Google Scholar 

  5. Alkadi O, Moustafa N, Turnbull B (2020) A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions. IEEE Access 8:104893–104917

    Google Scholar 

  6. Zaman S, Karray F (2009) Features selection for intrusion detection systems based on support vector machines. In: 2009 6th IEEE consumer communications and networking conference, pp. 1–8

  7. Guha R, Ghosh KK, Bera SK, Sarkar R, Mirjalili S (2023) Discrete equilibrium optimizer combined with simulated annealing for feature selection. J Comput Sci 67:101942

    Google Scholar 

  8. Tang X, Dai Y, Xiang Y (2019) Feature selection based on feature interactions with application to text categorization. Expert Syst Appl 120:207–216

    Google Scholar 

  9. El-Ghazali T (2009) Metaheuristics: from design to implementation. John Wiley, London

    MATH  Google Scholar 

  10. Amukta MV, Tirumala KB (2023) A hybrid filter-wrapper feature selection using fuzzy KNN based on Bonferroni mean for medical datasets classification: a covid-19 case study. Expert Syst Appl 218:119612

    Google Scholar 

  11. Namrata K, Pawanesh A (2023) Wrapper-based optimized feature selection using nature-inspired algorithms. Neural Comput Appl 35:1–15

    Google Scholar 

  12. Hammouri Abdelaziz I, Majdi M, Azmi A-BM, Awadallah Mohammed A, Iyad A-D (2020) An improved dragonfly algorithm for feature selection. Knowl -Based Syst 203:106131

    Google Scholar 

  13. Kalita DJ, Singh VP, Kumar V (2023) A novel adaptive optimization framework for SVM hyper-parameters tuning in non-stationary environment: a case study on intrusion detection system. Expert Syst Appl 213:119189

    Google Scholar 

  14. Alzubi QM, Anbar M, Alqattan ZNM, Al-Betar MA, Abdullah R (2020) Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput Appl 32:6125–6137

    Google Scholar 

  15. Dahou A, Abd Elaziz M, Chelloug SA, Awadallah MA, Al-Betar MA, Al-qaness MAA, Forestiero A (2022) Intrusion detection system for IoT based on deep learning and modified reptile search algorithm. Comput Intell Neurosci. https://doi.org/10.1155/2022/6473507

    Article  Google Scholar 

  16. Alzubi QM, Anbar M, Sanjalawe Y, Al-Betar MA, Abdullah R (2022) Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization. Expert Syst Appl 204:117597

    Google Scholar 

  17. Nasir MH, Khan SA, Khan MM, Fatima M (2022) Swarm intelligence inspired intrusion detection systems’a systematic literature review. Comput Netw 205:108708

    Google Scholar 

  18. Braik M, Hammouri A, Atwan J, Al-Betar MA, Awadallah MA (2022) White shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl-Based Syst 243:108457

    Google Scholar 

  19. Ali MA, Kamel S, Hassan MH, Ahmed EM, Alanazi M (2022) Optimal power flow solution of power systems with renewable energy sources using white sharks algorithm. Sustainability 14(10):6049

    Google Scholar 

  20. Makhadmeh SN, Al-Betar MA, Assaleh K, Kassaymeh S (2022) A hybrid white shark equilibrium optimizer for power scheduling problem based IoT. IEEE Access 10:132212–132231

    Google Scholar 

  21. Zhang R, Li X, Ding Y, Ren H (2022). UAV path planning method based on modified white shark optimization. In: 2022 IEEE International Conference on Unmanned Systems (ICUS), pp 380–386

  22. Chantar H, Mafarja M, Alsawalqah H, Heidari AA, Aljarah I, Faris H (2019) Feature selection using binary grey wolf optimizer with elite-based crossover for Arabic text classification. Neural Comput Appl 32:1–20

    Google Scholar 

  23. Isabelle G, André E (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157–1182

    MATH  Google Scholar 

  24. Devi RM, Premkumar M, Jangir P, Elkotb MA, Elavarasan RM, Nisar KS (2022) IRKO: an improved Runge–Kutta optimization algorithm for global optimization problems. Comput Mater Contin 70(3):4803–4827

    Google Scholar 

  25. Dhrubajyoti Gupta, Rabi Dhar Ananda, Shekhar Roy Shibendu (2021) A partition cum unification based genetic-firefly algorithm for single objective optimization. Sādhanā 46(3):121

    Google Scholar 

  26. Mojtaba G, Mohammad-Amin A, Changhyun J, Bateni SM, Mohsen Z, Amir Z, Hao-Ting P, Shahab SB, Moslehpour M, Chau K-W (2022) Circulatory system based optimization (CSBO): an expert multilevel biologically inspired meta-heuristic algorithm. Eng Appl Comput Fluid Mech 16(1):1483–1525

    Google Scholar 

  27. Zhao N, Ghaemi A, Wu C, Band SS, Chau KW, Zaguia A, Mafarja M, Mosavi AH (2021) A decomposition and multi-objective evolutionary optimization model for suspended sediment load prediction in rivers. Eng Appl Comput Fluid Mech 15(1):1811–1829

    Google Scholar 

  28. Wang W, Lei X, Chau K, Dong-mei X (2020) Yin-yang firefly algorithm based on dimensionally Cauchy mutation. Expert Syst Appl 150:113216

    Google Scholar 

  29. Mirjalili S (2016) SCA: a sine cosine algorithm for solving optimization problems. Knowl-Based Syst 96:120–133

    Google Scholar 

  30. Yang X, Wang R, Zhao D, Yu F, Huang C, Heidari AA, Cai Z, Bourouis S, Algarni AD, Chen H (2023) An adaptive quadratic interpolation and rounding mechanism sine cosine algorithm with application to constrained engineering optimization problems. Expert Syst Appl 213:119041

    Google Scholar 

  31. Abed-Alguni BH, Alawad NA, Al-Betar MA, Paul D (2022) Opposition-based sine cosine optimizer utilizing refraction learning and variable neighborhood search for feature selection. Appl Intell 53:1–43

    Google Scholar 

  32. Mafarja M, Aljarah I, Heidari AA, Hammouri AI, Faris H, Ala’M AZ, Mirjalili S (2018) Evolutionary population dynamics and grasshopper optimization approaches for feature selection problems. Knowl-Based Syst 145:25–45

    Google Scholar 

  33. Osamy W, Khedr AM, Vijayan D, Salim A (2023) TACTIRSO: trust aware clustering technique based on improved rat swarm optimizer for WSN-enabled intelligent transportation system. J Supercomput 79(6):5962–6016

    Google Scholar 

  34. Awadallah MA, Al-Betar MA, Braik MS, Hammouri AI, Doush IA, Zitar RA (2022) An enhanced binary rat swarm optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection. Comput Biol Med 147:105675

    Google Scholar 

  35. Mafarja MM, Mirjalili S (2017) Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing 260:302–312

    Google Scholar 

  36. Abed-alguni BH (2019) Island-based cuckoo search with highly disruptive polynomial mutation. Int J Artif Intell 17(1):57–82

    Google Scholar 

  37. Li A-D, Xue B, Zhang M (2021) Improved binary particle swarm optimization for feature selection with new initialization and search space reduction strategies. Appl Soft Comput 106:107302

    Google Scholar 

  38. Kılıç F, Kaya Y, Yildirim S (2021) A novel multi population based particle swarm optimization for feature selection. Knowl-Based Syst 219:106894

    Google Scholar 

  39. Hussain K, Neggaz N, Zhu W, Houssein EH (2021) An efficient hybrid sine-cosine Harris hawks optimization for low and high-dimensional feature selection. Expert Syst Appl 176:114778

    Google Scholar 

  40. Abed-Alguni BH, Alawad NA (2021) Distributed grey wolf optimizer for scheduling of workflow applications in cloud environments. Appl Soft Comput 102:107113

    Google Scholar 

  41. Abed-alguni Bilal H, Malek B (2018) Distributed grey wolf optimizer for numerical optimization problems. Jordan J Comput Inf Technol 4(3):21

    Google Scholar 

  42. Abed-alguni BH, Klaib AF (2020) Hybrid whale optimisation and \(\beta\)-hill climbing algorithm for continuous optimisation problems. Int J Comput Sci Math 12(4):350–363

    MathSciNet  Google Scholar 

  43. Abed-Alguni BH, Paul D, Hammad R (2022) Improved Salp swarm algorithm for solving single-objective continuous optimization problems. Appl Intell 52:1–20

    Google Scholar 

  44. Qaraad M, Amjad S, Hussein NK, Elhosseini MA (2022) Large scale Salp-based grey wolf optimization for feature selection and global optimization. Neural Comput Appl 34(11):8989–9014

    Google Scholar 

  45. Hussien AG, Amin M (2022) A self-adaptive Harris hawks optimization algorithm with opposition-based learning and chaotic local search strategy for global optimization and feature selection. Int J Mach Learn Cybern 13(2):309–336

    Google Scholar 

  46. Alkhateeb F, Abed-Alguni BH (2019) A hybrid cuckoo search and simulated annealing algorithm. J Intell Syst 28(4):683–698

    Google Scholar 

  47. Abed-alguni BH, Alawad NA, Barhoush M, Hammad R (2021) Exploratory cuckoo search for solving single-objective optimization problems. Soft Comput 25(15):10167–10180

    Google Scholar 

  48. Abed-alguni BH (2018) Action-selection method for reinforcement learning based on cuckoo search algorithm. Arab J Sci Eng 43(12):6771–6785

    Google Scholar 

  49. Hamidzadeh J et al (2021) Feature selection by using chaotic cuckoo optimization algorithm with levy flight, opposition-based learning and disruption operator. Soft Comput 25(4):2911–2933

    Google Scholar 

  50. Abed-alguni BH, Paul D (2022) Island-based cuckoo search with elite opposition-based learning and multiple mutation methods for solving optimization problems. Soft Comput 26(7):3293–3312

    Google Scholar 

  51. Abed-alguni BH, Alkhateeb F (2020) Intelligent hybrid cuckoo search and \(\beta\)-hill climbing algorithm. J King Saud Univ-Comput Inf Sci 32(2):159–173

    Google Scholar 

  52. Aziz MA, Hassanien AE (2018) Modified cuckoo search algorithm with rough sets for feature selection. Neural Comput Appl 29(4):925–934

    Google Scholar 

  53. Mafarja M, Heidari AA, Habib M, Faris H, Thaher T, Aljarah I (2020) Augmented whale feature selection for IoT attacks: structure, analysis and applications. Future Gener Syst 112:18–40

    Google Scholar 

  54. Shekhawat SS, Sharma H, Kumar S, Nayyar A, Qureshi B (2021) BSSA: binary Salp swarm algorithm with hybrid data transformation for feature selection. IEEE Access 9:14867–14882

    Google Scholar 

  55. Too J, Mafarja M, Mirjalili S (2021) Spatial bound whale optimization algorithm: an efficient high-dimensional feature selection approach. Neural Comput Appl 33(23):16229–16250

    Google Scholar 

  56. Alawad NA, Abed-alguni BH (2022) Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem. J Supercomput 78(3):3517–3538

    Google Scholar 

  57. Abd Elminaam DS, Nabil A, Ibraheem SA, Houssein EH (2021) An efficient marine predators algorithm for feature selection. IEEE Access 9:60136–60153

    Google Scholar 

  58. Xue Yu, Zhu H, Liang J, Słowik A (2021) Adaptive crossover operator based multi-objective binary genetic algorithm for feature selection in classification. Knowl-Based Syst 227:107218

    Google Scholar 

  59. Chen D, Li X, Li S (2021). A novel convolutional neural network model based on beetle antennae search optimization algorithm for computerized tomography diagnosis. In: IEEE Trans Neural Netw Learn Syst

  60. Ibrahim GJ, Rashid TA, Akinsolu MO (2020) An energy efficient service composition mechanism using a hybrid meta-heuristic algorithm in a mobile cloud environment. J Parallel Distrib Comput 143:77–87

    Google Scholar 

  61. Chen D, Wang Z, Zhou G, Li S (2022) Path planning and energy efficiency of heterogeneous mobile robots using cuckoo-beetle swarm search algorithms with applications in ugv obstacle avoidance. Sustainability 14(22):15137

    Google Scholar 

  62. Sammen SS, Ghorbani MA, Malik A, Tikhamarine Y, AmirRahmani M, Al-Ansari N, Chau K-W (2020) Enhanced artificial neural network with Harris hawks optimization for predicting scour depth downstream of ski-jump spillway. Appl Sci 10(15):5160

    Google Scholar 

  63. Sihwail R, Omar K, Ariffin KAZ, Tubishat M (2020) Improved Harris Hawks optimization using elite opposition-based learning and novel search mechanism for feature selection. IEEE Access 8:121127–121145

    Google Scholar 

  64. Osaba E, Carballedo R, Diaz F, Onieva E, De La Iglesia I, Perallos A (2014) Crossover versus mutation: a comparative analysis of the evolutionary strategy of genetic algorithms applied to combinatorial optimization problems. Sci World J 2014:154676

    Google Scholar 

  65. Abed-Alguni BH, Alkhateeb F (2017) Novel selection schemes for cuckoo search. Arab J Sci Engi 42(8):3635–3654

    Google Scholar 

  66. (2002) Nitesh VC, Kevin WB, Lawrence OH, Philip Kegelmeyer W (2002). SMOTE: Synthetic minority over-sampling technique. J Artif Intell Res 16:321–357

  67. Reverter A, Barris W, McWilliam S, Byrne KA, Wang YH, Tan SH, Hudson N, Dalrymple BP (2005) Validation of alternative methods of data normalization in gene co-expression studies. Bioinformatics 21(7):1112–1120

    Google Scholar 

  68. Keinosuke F (2013) Introduction to statistical pattern recognition. Elsevier, London

    MATH  Google Scholar 

  69. Jiawei H, Jian P, Hanghang T (2022) Data mining: concepts and techniques. Morgan kaufmann, San Fracisco

    Google Scholar 

  70. Wadhwani GK, Khatri SK, Muttoo SK (2020) SVM based approach for intrusion detection in manet. Rev Investig Oper 41(2):263–272

    Google Scholar 

  71. Gibbons JD, Fielden JDG (1993) Nonparametric statistics: an introduction, vol 90. Sage, London

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noor Aldeen Alawad.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Human and animal rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alawad, N.A., Abed-alguni, B.H., Al-Betar, M.A. et al. Binary improved white shark algorithm for intrusion detection systems. Neural Comput & Applic 35, 19427–19451 (2023). https://doi.org/10.1007/s00521-023-08772-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-023-08772-x

Keywords

Navigation