Open Access
ARTICLE
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security
1 Institute of Technology, VIT Bhopal University, Bhopal, India
2 School of Data Science and Forecasting, Devi Ahilya University, Indore, 452001, India
3 Department of Information Systems, Comenius University in Bratislava, Bratislava, 82005, Slovak Republic
4 Department of Artificial Intelligence, Lviv Polytechnic National University, Lviv, 79013, Ukraine
* Corresponding Authors: Oleh Basystiuk. Email: ,
Computer Systems Science and Engineering 2024, 48(3), 739-758. https://doi.org/10.32604/csse.2024.042607
Received 05 June 2023; Accepted 27 December 2023; Issue published 20 May 2024
Abstract
Cyber Defense is becoming a major issue for every organization to keep business continuity intact. The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm (ABC) as an Nature Inspired Cyber Security mechanism to achieve adaptive defense. It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node. Businesses today have adapted their service distribution models to include the use of the Internet, allowing them to effectively manage and interact with their customer data. This shift has created an increased reliance on online services to store vast amounts of confidential customer data, meaning any disruption or outage of these services could be disastrous for the business, leaving them without the knowledge to serve their customers. Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers. The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity. For any changes in network parameters, the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.