Skip to content

Saket-Upadhyay/firefly-ids

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Firefly IDS

https://github.com/Saket-Upadhyay/firefly-ids/blob/main/docs/image/FFIDS.png Firefly inspired IDS for Nature-Inspired Cyber Security

Contents

  1. Docs
    1. Image
  2. Experiment Results
    1. Architecture
    2. HF
    3. Scene 1
    4. Scene 2
  3. Paper
  4. Data
    1. Attack
    2. Normal

Cite

This work evolved into "Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity".

We believe in open, accessible, and reproducable research; if you find this interesting and decide to use any of the assets, kindly cite the following article.

@Article{pr11030715,
AUTHOR = {Shandilya, Shishir Kumar and Choi, Bong Jun and Kumar, Ajit and Upadhyay, Saket},
TITLE = {Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity},
JOURNAL = {Processes},
VOLUME = {11},
YEAR = {2023},
NUMBER = {3},
ARTICLE-NUMBER = {715},
URL = {https://www.mdpi.com/2227-9717/11/3/715},
ISSN = {2227-9717},
ABSTRACT = {The new paradigm of nature-inspired cybersecurity can establish a robust defense by utilizing well-established nature-inspired computing algorithms to analyze networks and act quickly. The existing research focuses primarily on the efficient selection of features for quick and optimized detection rates using firefly and other nature-inspired optimization techniques. However, selecting the most appropriate features may be specific to the network, and a different set of features may work better than the selected one. Therefore, there is a need for a generalized pre-processing step based on the standard network monitoring parameters for the early detection of suspicious nodes before applying feature-based or any other type of monitoring. This paper proposes a modified version of the firefly optimization algorithm to effectively monitor the network by introducing a novel health function for the early detection of suspicious nodes. We implement event management schemes based on the proposed algorithm and optimize the observation priority list based on a genetic evolution algorithm for real-time events in the network. The obtained simulation results demonstrate the effectiveness of the proposed algorithm under various attack scenarios. In addition, the results indicate that the proposed method reduces approximately 60–80% of the number of suspicious nodes while increasing the turnaround time by only approximately 1–2%. The proposed method also focuses specifically on accurate network health monitoring to protect the network proactively.},
DOI = {10.3390/pr11030715}
}

Releases

No releases published

Packages

No packages published