Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
Adaptive Defense has become an important factor in order to maintain device safety and security on the Internet. In 2021, there were more than 10 billion devices connected to the Internet which is estimated to exceed 25.4 billion by 2030. In order to implement the defensive mechanism approach to sec...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-07-01
|
Series: | Journal of King Saud University: Science |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1018364723001751 |
_version_ | 1797804703953715200 |
---|---|
author | Chirag Ganguli Shishir Kumar Shandilya Ivan Izonin |
author_facet | Chirag Ganguli Shishir Kumar Shandilya Ivan Izonin |
author_sort | Chirag Ganguli |
collection | DOAJ |
description | Adaptive Defense has become an important factor in order to maintain device safety and security on the Internet. In 2021, there were more than 10 billion devices connected to the Internet which is estimated to exceed 25.4 billion by 2030. In order to implement the defensive mechanism approach to security, this paper demonstrates the implementation of the Artificial Bees Colonization (ABC) Approach as Nature Inspired Cyber Security Algorithm. This paper analyzes the defensive approach to Distributed Denial-of-Service attack which limits the amount of traffic flow from each node, therefore, minimizing the attack surface. The simulated network shows the difference between the normal and attack throughput and compares the fitness of the network intermediaries with reference to the parametric graph that shows the effect of a simulated attack on each network intermediary. Thereafter, the state of defense from the ABC’s point of view shows the effectiveness of the proposed algorithm in detecting and minimizing traffic flow from malicious nodes thus, maintaining the network throughput while keeping the network stable.The proposed algorithm introduces an Adaptive Defense Approach that works recursively on the nodes attached to a network of clusters that prepares a solution set of probable malicious nodes that are attached to the network. The detected nodes are then analyzed by their properties based on the network parameters such as Network Throughput, End-to-End Delay, and Packet Delivery Ratio. On change in any of the factors in the devised properties, the node or cluster of nodes is marked as malicious and the rate of traffic flow along with the packet delivery ratio is reduced to match the normal node’s generic properties such that the hammering of the network with traffic is done under a controlled environment and the network works with reduced performance but does not halt even under attack thereby, maintaining business continuity under attack scenario. |
first_indexed | 2024-03-13T05:40:04Z |
format | Article |
id | doaj.art-ed477a643eea4075b7a20501324c9e5d |
institution | Directory Open Access Journal |
issn | 1018-3647 |
language | English |
last_indexed | 2024-03-13T05:40:04Z |
publishDate | 2023-07-01 |
publisher | Elsevier |
record_format | Article |
series | Journal of King Saud University: Science |
spelling | doaj.art-ed477a643eea4075b7a20501324c9e5d2023-06-14T04:32:55ZengElsevierJournal of King Saud University: Science1018-36472023-07-01355102713Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber securityChirag Ganguli0Shishir Kumar Shandilya1Ivan Izonin2Vellore Institute of Technology, VIT Bhopal University, Bhopal, IndiaVellore Institute of Technology, VIT Bhopal University, Bhopal, IndiaLviv Polytechnic National University, Lviv, Ukraine; Corresponding author at: Department of Artificial Intelligence, Lviv Polytechnic National University, Stepan Bandera Str., 12, Lviv 79000, Ukraine.Adaptive Defense has become an important factor in order to maintain device safety and security on the Internet. In 2021, there were more than 10 billion devices connected to the Internet which is estimated to exceed 25.4 billion by 2030. In order to implement the defensive mechanism approach to security, this paper demonstrates the implementation of the Artificial Bees Colonization (ABC) Approach as Nature Inspired Cyber Security Algorithm. This paper analyzes the defensive approach to Distributed Denial-of-Service attack which limits the amount of traffic flow from each node, therefore, minimizing the attack surface. The simulated network shows the difference between the normal and attack throughput and compares the fitness of the network intermediaries with reference to the parametric graph that shows the effect of a simulated attack on each network intermediary. Thereafter, the state of defense from the ABC’s point of view shows the effectiveness of the proposed algorithm in detecting and minimizing traffic flow from malicious nodes thus, maintaining the network throughput while keeping the network stable.The proposed algorithm introduces an Adaptive Defense Approach that works recursively on the nodes attached to a network of clusters that prepares a solution set of probable malicious nodes that are attached to the network. The detected nodes are then analyzed by their properties based on the network parameters such as Network Throughput, End-to-End Delay, and Packet Delivery Ratio. On change in any of the factors in the devised properties, the node or cluster of nodes is marked as malicious and the rate of traffic flow along with the packet delivery ratio is reduced to match the normal node’s generic properties such that the hammering of the network with traffic is done under a controlled environment and the network works with reduced performance but does not halt even under attack thereby, maintaining business continuity under attack scenario.http://www.sciencedirect.com/science/article/pii/S1018364723001751Nature Inspired Cyber Security (NICS)Artificial Bee Colonization Algorithm (ABC)Network simulationAdaptive defenseBusiness continuity |
spellingShingle | Chirag Ganguli Shishir Kumar Shandilya Ivan Izonin Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security Journal of King Saud University: Science Nature Inspired Cyber Security (NICS) Artificial Bee Colonization Algorithm (ABC) Network simulation Adaptive defense Business continuity |
title | Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security |
title_full | Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security |
title_fullStr | Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security |
title_full_unstemmed | Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security |
title_short | Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security |
title_sort | design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security |
topic | Nature Inspired Cyber Security (NICS) Artificial Bee Colonization Algorithm (ABC) Network simulation Adaptive defense Business continuity |
url | http://www.sciencedirect.com/science/article/pii/S1018364723001751 |
work_keys_str_mv | AT chiragganguli designandimplementationofadaptivenetworkstabilizationbasedonartificialbeescolonyoptimizationfornatureinspiredcybersecurity AT shishirkumarshandilya designandimplementationofadaptivenetworkstabilizationbasedonartificialbeescolonyoptimizationfornatureinspiredcybersecurity AT ivanizonin designandimplementationofadaptivenetworkstabilizationbasedonartificialbeescolonyoptimizationfornatureinspiredcybersecurity |