HYPER META-HEURISTIC IMPROVED PARTICLE SWARM OPTIMIZATION BASED SUPPORT VECTOR MACHINE (HMHIPSO-SVM) FOR BIG DATA CYBER SECURITY
DOI:
https://doi.org/10.61841/xvmhw080Keywords:
Machine Learning (ML), Support Vector Machine (SVM), Improved Particle Swarm Optimization (IPSO), Hyper Meta-Heuristic Improved Particle Swarm Optimization based Support Vector Machine (HMHIPSO-SVM), Big data, Cyber securityAbstract
Cybersecurity in the domain of big data is regarded as a crucial challenge for the research community. Machine learning (ML) algorithms are recommended to be the representatives for dealing with big data security issues. Generally, Support Vector Machine (SVM) has been found successful for different problems of classification. The user has to specify the right SVM configuration much earlier, which again is cumbersome, needing the help of skilled experts in choosing the kernel function and an excessive amount of manual labor for experiments. In order to resolve this problem, an HMHIPSO-SVM classifier is proposed to be designed, whose performance is necessary for dealing with the right choice of the low-level heuristic. The hyper-meta-heuristic improved particle swarm optimization-based support vector machine (HMHIPSO-SVM) framework comprises a high-level mechanism and low-level heuristics. The high-level mechanism employs the search performance for controlling which low-level heuristic has to be utilized for the SVM configuration generation. It is designed with the aim of optimizing the SVM multi-objective optimization problem by including the hyper meta-heuristic and Improved Particle Swarm Optimization (IPSO) algorithm. The process of SVM configuration is designed as the multi-objective optimization problem by taking the false positive (fp), false negative (fn), true positive (tp), and true negative (tn) into consideration, in which the results are attained based on metrics such as precision, recall, F-measure, and accuracy, and here the model complexity is found to be the two contradicting objectives. The efficiency of the HMHIPSO-SVM framework has been assessed on two cybersecurity challenges: (1) malware big data classification and (2) anomaly intrusion detection. The novel framework shows improved classification performance of big data cybersecurity problems in comparison with other available algorithms.
Downloads
References
1. A. Ju, Y. Guo, Z. Ye, T. Li, and J. Ma, HeteMSD: A Big Data Analytics Framework for Targeted Cyberattack Detection Using Heterogeneous Multisource Data, Security and Communication Networks, 2019.
2. C.W. Tsai, C.F. Lai, H.C. Chao, and A.V. Vasilakos, Big data analytics: a survey, Journal of Big Data, Vol.2,o. 1, pp. 21-50, 2015.
3. J. Hu and A.V. Vasilakos, Energy Big Data Analytics and Security: Challenges and Opportunities, IEEE Transactions on Smart Grid,l. 7, No. 5, pp. 2423-2436, 2016.
4. N.R. Sabar, J. Abawajy, and J. Yearwood, Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems, IEEE Transactions on Evolutionary Computation, Vol.21, No.2, Pp.315-327, 2016.
5. M. Chen, S. Mao, and Y. Liu, Big data: A survey, Mobile networks and applications, Vol.19,o. 2, pp. 171-209, 2014.
6. Z. Cui, F. Xue, X. Cai, Y. Cao, G.G. Wang, and J. Chen, Detection of malicious code variants based on deep learning, IEEE Transactions on Industrial Informatics,l. 14, No. 7, pp. 3187-3196, 2018.
7. Y. Ye, L. Chen, S. Hou, W. Hardy, and X. Li, DeepAM: a heterogeneous deep learning framework for intelligent malware detection, Knowledge and Information Systems,l. 54, No. 2, pp. 265-285, 2018.
8. Y. Ye, T. Li, D. Adjeroh and S.S. Iyengar, A survey on malware detection using data mining techniques,
ACM Computing Surveys (CSUR), Vol.50,o. 3, pp. 1-40, 2017.
9. S. Suthaharan, Big data classification: Problems and challenges in network intrusion prediction with
machine learning, ACM SIGMETRICS Performance Evaluation Review,l. 41, No. 4, Pp.70-73, 2014.
10. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an and H. Ye, Significant permission identification for learning-based android malware detection, IEEE Transactions on Industrial Informatics, Vol.14, No.7,
Pp. 3216-3225, 2018.
11. L. Haghnegahdar and Y. Wang, A whale optimization algorithm-trained artificial neural network for smart
grid cyber intrusion detection, Neural Computing and Applications, pp. 1-15, 2019.
12. F. Matern, C. Riess and M. Stamminger, Gradient-Based Illumination Description for Image Forgery
Detection, IEEE Transactions on Information Forensics and Security,l. 15, pp. 1303-1317, 2019.
13. M.H. Etesami, D.M. Vilathgamuwa, N. Ghasemi and D.P. Jovanovic, Enhanced metaheuristic methods
for selective harmonic elimination technique, IEEE Transactions on Industrial Informatics,l. 14, No. 12,
Pp. 5210-5220, 2018.
14. J. Wu, M. Dong, K. Ota, J. Li and Z. Guan, Big data analysis-based secure cluster management for
optimized control plane in software-defined networks, IEEE Transactions on Network and Service
Management, Vol.15, No.1, Pp.27-38, 2018.
15. D.S. Terzi, R. Terzi and S. Sagiroglu, Big data analytics for network anomaly detection from netflow data,
International Conference on Computer Science and Engineering (UBMK), pp. 592-597, 2017.
16. I. Kiss, B. Genge, P. Haller and G. Sebestyén, Data clustering-based anomaly detection in industrial
control systems, IEEE 10th International Conference on Intelligent Computer Communication and
Processing (ICCP), pp. 275-281, 2014.
17. T.T. Teoh, Y.Y. Nguwi, Y. Elovici, N.M. Cheung and W.L. Ng, Analyst intuition based Hidden Markov
Model on high speed, temporal cybersecurity big data, 13th International Conference on Natural
Computation, Fuzzy Systems, and Knowledge Discovery (ICNC-FSKD), pp. 2080-2083, 2017.
18. T.T. Teoh, Y. Zhang, Y.Y. Nguwi, Y. Elovici and W.L. Ng, Analyst intuition inspired high velocity big
data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate
cybersecurity risk, 13th International Conference on Natural Computation, Fuzzy Systems and
Knowledge Discovery (ICNC-FSKD), pp. 1790-1793, 2017.
19. J. Liu, X.W. Feng, J. Li and D.X. Wang, Cyber Security Situation Awareness Based on Data Mining,
Advanced Materials Research,l. 756, pp. 4336-4342, 2013.
20. Z. Ruan, Y. Miao, L. Pan, N. Patterson and J. Zhang, Visualization of big data security: a case study on
the KDD99 cup data set, Digital Communications and Networks,l. 3, No. 4, Pp.250-259, 2017.
21. N.R. Sabar, X. Yi, and A. Song, A bi-objective hyper-heuristic support vector machine for big data cybersecurity, IEEE Access,l. 6, pp. 10421-10431, 2018.
22. Y. Ma, W. Chen, X. Ma, J. Xu, X. Huang, R. Maciejewski and A.K. Tung, EasySVM: A visual analysis
approach for open-box support vector machines, Computational Visual Media, Vol.3,o. 2, pp. 161-175,
2017.
23. I. Ahmad, M. Basheri, M.J. Iqbal and A. Rahim, Performance comparison of support vector machine,
random forest, and extreme learning machine for intrusion detection, IEEE Access, Vol.6, 33789-
33795, 2018.
24. W. Zhao, T. Fan, Y. Nie, F. Wu and H. Wen, Research on attribute dimension partition based on SVM
classifying and MapReduce, Wireless Personal Communications,l. 102, No. 4, pp. 2759-2774, 2018.
25. S.M. Othman, F.M. Ba-Alwi, N.T. Alsohybe and A.Y. Al-Hashida, Intrusion detection model using
machine learning algorithm on Big Data environment, Journal of Big Data, Vol.5, No.1, Pp.34-45, 2018.
26. H. Wang, W. Wang, L. Cui, H. Sun, J. Zhao, Y. Wang and Y. Xue, A hybrid multi-objective firefly
algorithm for big data optimization, Applied Soft Computing,l. 69, pp. 806-815, 2018.
27. T. Su, H. Xu, and X. Zhou, Particle Swarm Optimization-Based Association Rule Mining in Big Data Environment, IEEE Access,l. 7, pp. 161008-161016, 2019.
28. http://bigdata.ise.bgu.ac.il/sherlock/#/
29. http://bigdata.ise.bgu.ac.il/sherlock/#/download
30. M. Ohsaki, P. Wang, K. Matsuda, S. Katagiri, H. Watanabe, and A. Ralescu, Confusion-matrix-based kernel logistic regression for imbalanced data classification, IEEE Transactions on Knowledge and Data Engineering, Vol.29,o. 9, pp. 1806-1819, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.