A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions

dc.authorscopusid57214871038
dc.authorscopusid57249416400
dc.authorscopusid54897517900
dc.authorscopusid55897274300
dc.contributor.authorHu, Wengui
dc.contributor.authorCao, Qingsong
dc.contributor.authorDarbandi, Mehdi
dc.contributor.authorNavimipour, Nima Jafari
dc.date.accessioned2024-06-23T21:37:34Z
dc.date.available2024-06-23T21:37:34Z
dc.date.issued2024
dc.departmentKadir Has Universityen_US
dc.department-temp[Hu, Wengui] Jiangxi Univ Technol, Sch Informat Engn, Nanchang 330098, Jiangxi, Peoples R China; [Cao, Qingsong] Jiangxi Univ Technol, Sch Informat Engn, Nanchang 330098, Jiangxi, Peoples R China; [Darbandi, Mehdi] Pole Univ Leonard de Vinci, Paris, France; [Navimipour, Nima Jafari] Dept Comp Engn, Kadir Has Univ, TR-34085 Istanbul, Turkiye; [Navimipour, Nima Jafari] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwanen_US
dc.description.abstractThe number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce sensitive and personal data has rapidly increased in recent years. The IoT is a new model that integrates physical objects and the Internet and has become one of the principal technological evolutions of computing. Cloud computing is a paradigm for centralized computing that gathers resources in one place and makes them available to consumers via the Internet. Despite the vast array of resources that cloud computing offers, real-time mobile applications might not find it acceptable because it is typically located far from users. However, in applications where low latency and high dependability are required, edge computing-which disperses resources to the network edge-is becoming more and more popular. Though it has less processing power than traditional cloud computing, edge computing offers resources in a decentralized way that can react to customers' needs more quickly. There has been a sharp increase in attackers stealing data from these applications since the data is so sensitive. Thus, a powerful Intrusion Detection System (IDS) that can identify intruders is required. IDS are essential for the cybersecurity of the IoT, cloud, and edge architectures. Investigators have mostly embraced the use of deep learning algorithms as a means of protecting the IoT environment. However, these techniques have some issues with computational complexity, long processing times, and poor precision. Feature selection approaches can be utilized to overcome these problems. Optimization methods, including bio-inspired algorithms, are applied as feature selection approaches to enhance the classification accuracy of IDS systems. Based on the cited sources, it appears that no study has looked into these difficulties in depth. This research thoroughly analyzes the current literature on intrusion detection and using nature-inspired algorithms to safeguard IoT and cloud/edge settings. This article examines pertinent analyses and surveys on the aforementioned subjects, dangers, and outlooks. It also examines many frequently used algorithms in the development of IDSs used in IoT security. The findings demonstrate their efficiency in addressing IoT and cloud/edge ecosystem security issues. Moreover, it has been shown that the methods put out in the literature might improve IDS security and dependability in terms of precision and execution speed.en_US
dc.description.sponsorshipJiangxi Provincial Department of Education Science and Technologyen_US
dc.description.sponsorshipNo Statement Availableen_US
dc.identifier.citation0
dc.identifier.doi10.1007/s10586-024-04385-8
dc.identifier.issn1386-7857
dc.identifier.issn1573-7543
dc.identifier.scopus2-s2.0-85191747692
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.1007/s10586-024-04385-8
dc.identifier.urihttps://hdl.handle.net/20.500.12469/5730
dc.identifier.wosWOS:001208643500001
dc.identifier.wosqualityN/A
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.relation.publicationcategoryDiğeren_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectNature-inspired algorithmsen_US
dc.subjectCloud computingen_US
dc.subjectIntrusion detection systemsen_US
dc.subjectIntrusion detectionen_US
dc.subjectInternet of Thingsen_US
dc.titleA deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directionsen_US
dc.typeReviewen_US
dspace.entity.typePublication

Files