HYPER META-HEURISTIC IMPROVED PARTICLE SWARM OPTIMIZATION BASED SUPPORT VECTOR MACHINE (HMHIPSO-SVM) FOR BIG DATA CYBER SECURITY

Authors

  • Mrs.G.A. Mylavathi Assistant Professor of Computer Science Gobi Arts & Science College, Gobichettipalayam Author
  • Dr. B. Srinivasan Associate Professor of Computer Science Gobi Arts & Science College, Gobichettipalayam Author

DOI:

https://doi.org/10.61841/xvmhw080

Keywords:

Machine Learning (ML), Support Vector Machine (SVM), Improved Particle Swarm Optimization (IPSO), Hyper Meta-Heuristic Improved Particle Swarm Optimization based Support Vector Machine (HMHIPSO-SVM), Big data, Cyber security

Abstract

Cybersecurity in the domain of big data is regarded as a crucial challenge for the research community. Machine learning (ML) algorithms are recommended to be the representatives for dealing with big data security issues. Generally, Support Vector Machine (SVM) has been found successful for different problems of classification. The user has to specify the right SVM configuration much earlier, which again is cumbersome, needing the help of skilled experts in choosing the kernel function and an excessive amount of manual labor for experiments. In order to resolve this problem, an HMHIPSO-SVM classifier is proposed to be designed, whose performance is necessary for dealing with the right choice of the low-level heuristic. The hyper-meta-heuristic improved particle swarm optimization-based support vector machine (HMHIPSO-SVM) framework comprises a high-level mechanism and low-level heuristics. The high-level mechanism employs the search performance for controlling which low-level heuristic has to be utilized for the SVM configuration generation. It is designed with the aim of optimizing the SVM multi-objective optimization problem by including the hyper meta-heuristic and Improved Particle Swarm Optimization (IPSO) algorithm. The process of SVM configuration is designed as the multi-objective optimization problem by taking the false positive (fp), false negative (fn), true positive (tp), and true negative (tn) into consideration, in which the results are attained based on metrics such as precision, recall, F-measure, and accuracy, and here the model complexity is found to be the two contradicting objectives. The efficiency of the HMHIPSO-SVM framework has been assessed on two cybersecurity challenges: (1) malware big data classification and (2) anomaly intrusion detection. The novel framework shows improved classification performance of big data cybersecurity problems in comparison with other available algorithms. 

Downloads

Download data is not yet available.

References

1. A. Ju, Y. Guo, Z. Ye, T. Li, and J. Ma, HeteMSD: A Big Data Analytics Framework for Targeted Cyberattack Detection Using Heterogeneous Multisource Data, Security and Communication Networks, 2019.

2. C.W. Tsai, C.F. Lai, H.C. Chao, and A.V. Vasilakos, Big data analytics: a survey, Journal of Big Data, Vol.2,o. 1, pp. 21-50, 2015.

3. J. Hu and A.V. Vasilakos, Energy Big Data Analytics and Security: Challenges and Opportunities, IEEE Transactions on Smart Grid,l. 7, No. 5, pp. 2423-2436, 2016.

4. N.R. Sabar, J. Abawajy, and J. Yearwood, Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems, IEEE Transactions on Evolutionary Computation, Vol.21, No.2, Pp.315-327, 2016.

5. M. Chen, S. Mao, and Y. Liu, Big data: A survey, Mobile networks and applications, Vol.19,o. 2, pp. 171-209, 2014.

6. Z. Cui, F. Xue, X. Cai, Y. Cao, G.G. Wang, and J. Chen, Detection of malicious code variants based on deep learning, IEEE Transactions on Industrial Informatics,l. 14, No. 7, pp. 3187-3196, 2018.

7. Y. Ye, L. Chen, S. Hou, W. Hardy, and X. Li, DeepAM: a heterogeneous deep learning framework for intelligent malware detection, Knowledge and Information Systems,l. 54, No. 2, pp. 265-285, 2018.

8. Y. Ye, T. Li, D. Adjeroh and S.S. Iyengar, A survey on malware detection using data mining techniques,

ACM Computing Surveys (CSUR), Vol.50,o. 3, pp. 1-40, 2017.

9. S. Suthaharan, Big data classification: Problems and challenges in network intrusion prediction with

machine learning, ACM SIGMETRICS Performance Evaluation Review,l. 41, No. 4, Pp.70-73, 2014.

10. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, Significant permission identification for learning-based android malware detection, IEEE Transactions on Industrial Informatics, Vol.14, No.7,

Pp. 3216-3225, 2018.

11. L. Haghnegahdar and Y. Wang, A whale optimization algorithm-trained artificial neural network for smart

grid cyber intrusion detection, Neural Computing and Applications, pp. 1-15, 2019.

12. F. Matern, C. Riess and M. Stamminger, Gradient-Based Illumination Description for Image Forgery

Detection, IEEE Transactions on Information Forensics and Security,l. 15, pp. 1303-1317, 2019.

13. M.H. Etesami, D.M. Vilathgamuwa, N. Ghasemi and D.P. Jovanovic, Enhanced metaheuristic methods

for selective harmonic elimination technique, IEEE Transactions on Industrial Informatics,l. 14, No. 12,

Pp. 5210-5220, 2018.

14. J. Wu, M. Dong, K. Ota, J. Li and Z. Guan, Big data analysis-based secure cluster management for

optimized control plane in software-defined networks, IEEE Transactions on Network and Service

Management, Vol.15, No.1, Pp.27-38, 2018.

15. D.S. Terzi, R. Terzi and S. Sagiroglu, Big data analytics for network anomaly detection from netflow data,

International Conference on Computer Science and Engineering (UBMK), pp. 592-597, 2017.

16. I. Kiss, B. Genge, P. Haller and G. Sebestyén, Data clustering-based anomaly detection in industrial

control systems, IEEE 10th International Conference on Intelligent Computer Communication and

Processing (ICCP), pp. 275-281, 2014.

17. T.T. Teoh, Y.Y. Nguwi, Y. Elovici, N.M. Cheung and W.L. Ng, Analyst intuition based Hidden Markov

Model on high speed, temporal cybersecurity big data, 13th International Conference on Natural

Computation, Fuzzy Systems, and Knowledge Discovery (ICNC-FSKD), pp. 2080-2083, 2017.

18. T.T. Teoh, Y. Zhang, Y.Y. Nguwi, Y. Elovici and W.L. Ng, Analyst intuition inspired high velocity big

data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate

cybersecurity risk, 13th International Conference on Natural Computation, Fuzzy Systems and

Knowledge Discovery (ICNC-FSKD), pp. 1790-1793, 2017.

19. J. Liu, X.W. Feng, J. Li and D.X. Wang, Cyber Security Situation Awareness Based on Data Mining,

Advanced Materials Research,l. 756, pp. 4336-4342, 2013.

20. Z. Ruan, Y. Miao, L. Pan, N. Patterson and J. Zhang, Visualization of big data security: a case study on

the KDD99 cup data set, Digital Communications and Networks,l. 3, No. 4, Pp.250-259, 2017.

21. N.R. Sabar, X. Yi, and A. Song, A bi-objective hyper-heuristic support vector machine for big data cybersecurity, IEEE Access,l. 6, pp. 10421-10431, 2018.

22. Y. Ma, W. Chen, X. Ma, J. Xu, X. Huang, R. Maciejewski and A.K. Tung, EasySVM: A visual analysis

approach for open-box support vector machines, Computational Visual Media, Vol.3,o. 2, pp. 161-175,

2017.

23. I. Ahmad, M. Basheri, M.J. Iqbal and A. Rahim, Performance comparison of support vector machine,

random forest, and extreme learning machine for intrusion detection, IEEE Access, Vol.6, 33789-

33795, 2018.

24. W. Zhao, T. Fan, Y. Nie, F. Wu and H. Wen, Research on attribute dimension partition based on SVM

classifying and MapReduce, Wireless Personal Communications,l. 102, No. 4, pp. 2759-2774, 2018.

25. S.M. Othman, F.M. Ba-Alwi, N.T. Alsohybe and A.Y. Al-Hashida, Intrusion detection model using

machine learning algorithm on Big Data environment, Journal of Big Data, Vol.5, No.1, Pp.34-45, 2018.

26. H. Wang, W. Wang, L. Cui, H. Sun, J. Zhao, Y. Wang and Y. Xue, A hybrid multi-objective firefly

algorithm for big data optimization, Applied Soft Computing,l. 69, pp. 806-815, 2018.

27. T. Su, H. Xu, and X. Zhou, Particle Swarm Optimization-Based Association Rule Mining in Big Data Environment, IEEE Access,l. 7, pp. 161008-161016, 2019.

28. http://bigdata.ise.bgu.ac.il/sherlock/#/

29. http://bigdata.ise.bgu.ac.il/sherlock/#/download

30. M. Ohsaki, P. Wang, K. Matsuda, S. Katagiri, H. Watanabe, and A. Ralescu, Confusion-matrix-based kernel logistic regression for imbalanced data classification, IEEE Transactions on Knowledge and Data Engineering, Vol.29,o. 9, pp. 1806-1819, 2017.

Downloads

Published

31.07.2020

How to Cite

Mylavathi, G., & B. , S. (2020). HYPER META-HEURISTIC IMPROVED PARTICLE SWARM OPTIMIZATION BASED SUPPORT VECTOR MACHINE (HMHIPSO-SVM) FOR BIG DATA CYBER SECURITY. International Journal of Psychosocial Rehabilitation, 24(5), 7959-7975. https://doi.org/10.61841/xvmhw080