Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security

Adaptive Defense has become an important factor in order to maintain device safety and security on the Internet. In 2021, there were more than 10 billion devices connected to the Internet which is estimated to exceed 25.4 billion by 2030. In order to implement the defensive mechanism approach to sec...

Full description

Bibliographic Details
Main Authors: Chirag Ganguli, Shishir Kumar Shandilya, Ivan Izonin
Format: Article
Language:English
Published: Elsevier 2023-07-01
Series:Journal of King Saud University: Science
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1018364723001751
_version_ 1797804703953715200
author Chirag Ganguli
Shishir Kumar Shandilya
Ivan Izonin
author_facet Chirag Ganguli
Shishir Kumar Shandilya
Ivan Izonin
author_sort Chirag Ganguli
collection DOAJ
description Adaptive Defense has become an important factor in order to maintain device safety and security on the Internet. In 2021, there were more than 10 billion devices connected to the Internet which is estimated to exceed 25.4 billion by 2030. In order to implement the defensive mechanism approach to security, this paper demonstrates the implementation of the Artificial Bees Colonization (ABC) Approach as Nature Inspired Cyber Security Algorithm. This paper analyzes the defensive approach to Distributed Denial-of-Service attack which limits the amount of traffic flow from each node, therefore, minimizing the attack surface. The simulated network shows the difference between the normal and attack throughput and compares the fitness of the network intermediaries with reference to the parametric graph that shows the effect of a simulated attack on each network intermediary. Thereafter, the state of defense from the ABC’s point of view shows the effectiveness of the proposed algorithm in detecting and minimizing traffic flow from malicious nodes thus, maintaining the network throughput while keeping the network stable.The proposed algorithm introduces an Adaptive Defense Approach that works recursively on the nodes attached to a network of clusters that prepares a solution set of probable malicious nodes that are attached to the network. The detected nodes are then analyzed by their properties based on the network parameters such as Network Throughput, End-to-End Delay, and Packet Delivery Ratio. On change in any of the factors in the devised properties, the node or cluster of nodes is marked as malicious and the rate of traffic flow along with the packet delivery ratio is reduced to match the normal node’s generic properties such that the hammering of the network with traffic is done under a controlled environment and the network works with reduced performance but does not halt even under attack thereby, maintaining business continuity under attack scenario.
first_indexed 2024-03-13T05:40:04Z
format Article
id doaj.art-ed477a643eea4075b7a20501324c9e5d
institution Directory Open Access Journal
issn 1018-3647
language English
last_indexed 2024-03-13T05:40:04Z
publishDate 2023-07-01
publisher Elsevier
record_format Article
series Journal of King Saud University: Science
spelling doaj.art-ed477a643eea4075b7a20501324c9e5d2023-06-14T04:32:55ZengElsevierJournal of King Saud University: Science1018-36472023-07-01355102713Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber securityChirag Ganguli0Shishir Kumar Shandilya1Ivan Izonin2Vellore Institute of Technology, VIT Bhopal University, Bhopal, IndiaVellore Institute of Technology, VIT Bhopal University, Bhopal, IndiaLviv Polytechnic National University, Lviv, Ukraine; Corresponding author at: Department of Artificial Intelligence, Lviv Polytechnic National University, Stepan Bandera Str., 12, Lviv 79000, Ukraine.Adaptive Defense has become an important factor in order to maintain device safety and security on the Internet. In 2021, there were more than 10 billion devices connected to the Internet which is estimated to exceed 25.4 billion by 2030. In order to implement the defensive mechanism approach to security, this paper demonstrates the implementation of the Artificial Bees Colonization (ABC) Approach as Nature Inspired Cyber Security Algorithm. This paper analyzes the defensive approach to Distributed Denial-of-Service attack which limits the amount of traffic flow from each node, therefore, minimizing the attack surface. The simulated network shows the difference between the normal and attack throughput and compares the fitness of the network intermediaries with reference to the parametric graph that shows the effect of a simulated attack on each network intermediary. Thereafter, the state of defense from the ABC’s point of view shows the effectiveness of the proposed algorithm in detecting and minimizing traffic flow from malicious nodes thus, maintaining the network throughput while keeping the network stable.The proposed algorithm introduces an Adaptive Defense Approach that works recursively on the nodes attached to a network of clusters that prepares a solution set of probable malicious nodes that are attached to the network. The detected nodes are then analyzed by their properties based on the network parameters such as Network Throughput, End-to-End Delay, and Packet Delivery Ratio. On change in any of the factors in the devised properties, the node or cluster of nodes is marked as malicious and the rate of traffic flow along with the packet delivery ratio is reduced to match the normal node’s generic properties such that the hammering of the network with traffic is done under a controlled environment and the network works with reduced performance but does not halt even under attack thereby, maintaining business continuity under attack scenario.http://www.sciencedirect.com/science/article/pii/S1018364723001751Nature Inspired Cyber Security (NICS)Artificial Bee Colonization Algorithm (ABC)Network simulationAdaptive defenseBusiness continuity
spellingShingle Chirag Ganguli
Shishir Kumar Shandilya
Ivan Izonin
Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
Journal of King Saud University: Science
Nature Inspired Cyber Security (NICS)
Artificial Bee Colonization Algorithm (ABC)
Network simulation
Adaptive defense
Business continuity
title Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
title_full Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
title_fullStr Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
title_full_unstemmed Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
title_short Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
title_sort design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security
topic Nature Inspired Cyber Security (NICS)
Artificial Bee Colonization Algorithm (ABC)
Network simulation
Adaptive defense
Business continuity
url http://www.sciencedirect.com/science/article/pii/S1018364723001751
work_keys_str_mv AT chiragganguli designandimplementationofadaptivenetworkstabilizationbasedonartificialbeescolonyoptimizationfornatureinspiredcybersecurity
AT shishirkumarshandilya designandimplementationofadaptivenetworkstabilizationbasedonartificialbeescolonyoptimizationfornatureinspiredcybersecurity
AT ivanizonin designandimplementationofadaptivenetworkstabilizationbasedonartificialbeescolonyoptimizationfornatureinspiredcybersecurity