A Deep Analysis of Nature-Inspired and Meta-Heuristic Algorithms for Designing Intrusion Detection Systems in Cloud/Edge and Iot: State-Of Techniques, Challenges, and Future Directions

dc.authorscopusid 57214871038
dc.authorscopusid 57249416400
dc.authorscopusid 54897517900
dc.authorscopusid 55897274300
dc.contributor.author Hu, Wengui
dc.contributor.author Jafari Navimipour, Nima
dc.contributor.author Cao, Qingsong
dc.contributor.author Darbandi, Mehdi
dc.contributor.author Navimipour, Nima Jafari
dc.contributor.other Computer Engineering
dc.date.accessioned 2024-06-23T21:37:34Z
dc.date.available 2024-06-23T21:37:34Z
dc.date.issued 2024
dc.department Kadir Has University en_US
dc.department-temp [Hu, Wengui] Jiangxi Univ Technol, Sch Informat Engn, Nanchang 330098, Jiangxi, Peoples R China; [Cao, Qingsong] Jiangxi Univ Technol, Sch Informat Engn, Nanchang 330098, Jiangxi, Peoples R China; [Darbandi, Mehdi] Pole Univ Leonard de Vinci, Paris, France; [Navimipour, Nima Jafari] Dept Comp Engn, Kadir Has Univ, TR-34085 Istanbul, Turkiye; [Navimipour, Nima Jafari] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwan en_US
dc.description.abstract The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce sensitive and personal data has rapidly increased in recent years. The IoT is a new model that integrates physical objects and the Internet and has become one of the principal technological evolutions of computing. Cloud computing is a paradigm for centralized computing that gathers resources in one place and makes them available to consumers via the Internet. Despite the vast array of resources that cloud computing offers, real-time mobile applications might not find it acceptable because it is typically located far from users. However, in applications where low latency and high dependability are required, edge computing-which disperses resources to the network edge-is becoming more and more popular. Though it has less processing power than traditional cloud computing, edge computing offers resources in a decentralized way that can react to customers' needs more quickly. There has been a sharp increase in attackers stealing data from these applications since the data is so sensitive. Thus, a powerful Intrusion Detection System (IDS) that can identify intruders is required. IDS are essential for the cybersecurity of the IoT, cloud, and edge architectures. Investigators have mostly embraced the use of deep learning algorithms as a means of protecting the IoT environment. However, these techniques have some issues with computational complexity, long processing times, and poor precision. Feature selection approaches can be utilized to overcome these problems. Optimization methods, including bio-inspired algorithms, are applied as feature selection approaches to enhance the classification accuracy of IDS systems. Based on the cited sources, it appears that no study has looked into these difficulties in depth. This research thoroughly analyzes the current literature on intrusion detection and using nature-inspired algorithms to safeguard IoT and cloud/edge settings. This article examines pertinent analyses and surveys on the aforementioned subjects, dangers, and outlooks. It also examines many frequently used algorithms in the development of IDSs used in IoT security. The findings demonstrate their efficiency in addressing IoT and cloud/edge ecosystem security issues. Moreover, it has been shown that the methods put out in the literature might improve IDS security and dependability in terms of precision and execution speed. en_US
dc.description.sponsorship Jiangxi Provincial Department of Education Science and Technology en_US
dc.description.sponsorship No Statement Available en_US
dc.identifier.citationcount 0
dc.identifier.doi 10.1007/s10586-024-04385-8
dc.identifier.issn 1386-7857
dc.identifier.issn 1573-7543
dc.identifier.scopus 2-s2.0-85191747692
dc.identifier.scopusquality Q1
dc.identifier.uri https://doi.org/10.1007/s10586-024-04385-8
dc.identifier.uri https://hdl.handle.net/20.500.12469/5730
dc.identifier.wos WOS:001208643500001
dc.language.iso en en_US
dc.publisher Springer en_US
dc.relation.publicationcategory Diğer en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 5
dc.subject Nature-inspired algorithms en_US
dc.subject Cloud computing en_US
dc.subject Intrusion detection systems en_US
dc.subject Intrusion detection en_US
dc.subject Internet of Things en_US
dc.title A Deep Analysis of Nature-Inspired and Meta-Heuristic Algorithms for Designing Intrusion Detection Systems in Cloud/Edge and Iot: State-Of Techniques, Challenges, and Future Directions en_US
dc.type Review en_US
dc.wos.citedbyCount 2
dspace.entity.type Publication
relation.isAuthorOfPublication 0fb3c7a0-c005-4e5f-a9ae-bb163df2df8e
relation.isAuthorOfPublication.latestForDiscovery 0fb3c7a0-c005-4e5f-a9ae-bb163df2df8e
relation.isOrgUnitOfPublication fd8e65fe-c3b3-4435-9682-6cccb638779c
relation.isOrgUnitOfPublication.latestForDiscovery fd8e65fe-c3b3-4435-9682-6cccb638779c

Files