Home / Journals / CSSE / Online First / doi:10.32604/csse.2024.042607
Special lssues

Open Access

ARTICLE

Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security

Chirag Ganguli1, Shishir Kumar Shandilya2, Michal Gregus3, Oleh Basystiuk4,*
1 Institute of Technology, VIT Bhopal University, Bhopal, India
2 School of Data Science and Forecasting, Devi Ahilya University, Indore, 452001, India
3 Department of Information Systems, Comenius University in Bratislava, Bratislava, 82005, Slovak Republic
4 Department of Artificial Intelligence, Lviv Polytechnic National University, Lviv, 79013, Ukraine
* Corresponding Author: Oleh Basystiuk. Email: email,email

Computer Systems Science and Engineering https://doi.org/10.32604/csse.2024.042607

Received 05 June 2023; Accepted 27 December 2023; Published online 25 March 2024

Abstract

Cyber Defense is becoming a major issue for every organization to keep business continuity intact. The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm (ABC) as an Nature Inspired Cyber Security mechanism to achieve adaptive defense. It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node. Businesses today have adapted their service distribution models to include the use of the Internet, allowing them to effectively manage and interact with their customer data. This shift has created an increased reliance on online services to store vast amounts of confidential customer data, meaning any disruption or outage of these services could be disastrous for the business, leaving them without the knowledge to serve their customers. Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers. The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity. For any changes in network parameters, the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.

Keywords

Artificial bee colonization; adaptive defense; cyber attack; nature inspired cyber security; cyber security; cyber physical infrastructure
  • 197

    View

  • 38

    Download

  • 8

    Like

Share Link