A Survey on Application of Swarm Intelligence in Network Security

Authors

  • Muhammad Saad Iftikhar School of Electrical Engineering & Computer Sciences, National University of Sciences and Technology, Islamabad
  • Muhammad Raza Fraz School of Electrical Engineering & Computer Sciences, National University of Sciences and Technology, Islamabad

DOI:

https://doi.org/10.14738/tmlai.v1i1.24

Abstract

Nowadays security is an essential part of every framework. In past few years due to the increase in access of malicious data over the Internet resources the security becomes a necessary component. Swarm intelligence is an emerging and new biological field of optimization. The researchers have already developed many algorithms by studying the behavior of different swarms of incest such as Ants Bees etc. After the success of swarm intelligence in other areas researchers now started work in the field of security too. In this survey paper we tried to find out the reason of network security and how swarm intelligence method have been used to make system efficient in term of performance by providing network security.

Author Biography

Muhammad Saad Iftikhar, School of Electrical Engineering & Computer Sciences, National University of Sciences and Technology, Islamabad

I am a candidate of MS Electrical Engineering (Telecom & Networks) at School of Electrical Engineering and Computer Science – NUST

References

Hao, Y., et al., Security in mobile ad hoc networks: challenges and solutions. Wireless Communications, IEEE, 2004. 11(1): p. 38-47.

Pathan, A.S.K., L. Hyung-Woo, and H. Choong Seon. Security in wireless sensor networks: issues and challenges. in Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference. 2006.

Williamson, M.M., Biologically inspired approaches to computer security. Information Infrastructure Laboratory, HP Laboratories Bristol, 2002.

Systems, C. What is network security. 2013 [cited 2013 March]; Available from: http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html.

University, B. Network Security. 2010 [cited 2013 march]; Available from: http://www.cc.boun.edu.tr/network_security.html.

Martino, G., F. Cardillo, and A. Starita, A new swarm intelligence coordination model inspired by collective prey retrieval and its application to image alignment. Parallel Problem Solving from Nature-PPSN IX, 2006: p. 691-700.

Beni G, W.J., Swarm intelligence in cellular robotics systems, 1989: NATO Advanced Workshop on Robots and Biological System

Deneubourg, J.L., et al., The self-organizing exploratory pattern of the argentine ant. Journal of insect behavior, 1990. 3(2): p. 159-168.

Goss, S., et al., Self-organized shortcuts in the Argentine ant. Naturwissenschaften, 1989. 76(12): p. 579-581.

Reynolds, C.W. Flocks, herds and schools: A distributed behavioral model. in ACM SIGGRAPH Computer Graphics. 1987. ACM.

Kennedy, J. and R. Eberhart. Particle swarm optimization. in Neural Networks, 1995. Proceedings., IEEE International Conference on. 1995. IEEE.

Frazier, E. Ants vs Worms. 2009 [cited 2013 march]; Available from: http://www.wfu.edu/wowf/2009/20090921.ants.html.

Kassner, M. Swarm Intelligence: Are digital ants the answer to malware. 2009 [cited 2013 March]; Available from: http://www.techrepublic.com/blog/security/swarm-intelligence-are-digital-ants-the-answer-to-malware/2757.

Fenet, S. and S. Hassas, A distributed Intrusion Detection and Response System based on mobile autonomous agents using social insects communication paradigm. Electronic Notes in Theoretical Computer Science, 2002. 63: p. 41-58.

Foukia, N. IDReAM: intrusion detection and response executed with agent mobility architecture and implementation. in Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. 2005. ACM.

Abadi, M. and S. Jalili, An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng, 2006. 2(3): p. 106-120.

Soroush, E., M.S. Abadeh, and J. Habibi. A Boosting Ant-Colony Optimization Algorithm for Computer Intrusion Detection. in Proceedings of the 2006 International Symposium on Frontiers in Networking with Applications (FINA 2006). 2006.

He, J. and D. Long. An improved ant-based classifier for intrusion detection. in Natural Computation, 2007. ICNC 2007. Third International Conference on. 2007. IEEE.

Dozier, G., et al., Vulnerability analysis of immunity-based intrusion detection systems using genetic and evolutionary hackers. Applied Soft Computing, 2007. 7(2): p. 547-553.

Dozier, G., et al. Vulnerability analysis of AIS-based intrusion detection systems via genetic and particle swarm red teams. in Evolutionary Computation, 2004. CEC2004. Congress on. 2004. IEEE.

Michailidis, E., S.K. Katsikas, and E. Georgopoulos. Intrusion detection using evolutionary neural networks. in Informatics, 2008. PCI'08. Panhellenic Conference on. 2008. IEEE.

Xiao, L., Z. Shao, and G. Liu. K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection. in Intelligent Control and Automation, 2006. WCICA 2006. The Sixth World Congress on. 2006. IEEE.

MacQueen, J. Some methods for classification and analysis of multivariate observations. in Proceedings of the fifth Berkeley symposium on mathematical statistics and probability. 1967. California, USA.

Liu, L. and Y. Liu. MQPSO based on wavelet neural network for network anomaly detection. in Wireless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th International Conference on. 2009. IEEE.

Downloads

Published

2013-12-17

How to Cite

Iftikhar, M. S., & Fraz, M. R. (2013). A Survey on Application of Swarm Intelligence in Network Security. Transactions on Engineering and Computing Sciences, 1(1). https://doi.org/10.14738/tmlai.v1i1.24