Skip to main content
Log in

Nature Inspired Techniques and Applications in Intrusion Detection Systems: Recent Progress and Updated Perspective

  • Original Paper
  • Published:
Archives of Computational Methods in Engineering Aims and scope Submit manuscript

Abstract

Nowadays, it has become a necessity for operational and reliable operation of networks due to our increased dependency over the network services. However, intruders are continuously attempting to break into the networks and disturbing the network services using a variety of attack vectors and technologies. This motivates us to develop the techniques that ensure operational and reliable network, even in changing scenarios. Recently, most of the researchers have focused on the employment of techniques inspired by a natural phenomenon to detect the intrusions effectively. Nature-Inspired Techniques (NITs) have the ability to adapt to a constantly changing environment. Thus, they help to provide in-built resiliency to failures and damages, collaborative, survivable, self-organizing and self-healing capabilities to IDSs. The paper presents an analysis of NITs, and their classification based on the source of their inspiration. A comprehensive review of various NITs employed in intrusion detection is presented. Analysis of prominent research indicates that NITs based IDSs offers high detection rate and low false positive rate in comparison to the conventional IDSs. The NITs enables more flexibility in IDSs because of their employability into hybrid IDSs leading to detection on the basis of anomalies as well as signatures, leading in improving detection results of known and unknown attacks. The paper attempts to identify NITs’ advantages, disadvantages and significant challenges to the successful implementation of NITs in the intrusion detection area. The main intention of this paper is to explore and present a comprehensive review of the application of NITs in intrusion detection, covering a variety of NITs, study of the techniques and architectures used and further the contribution of NITs in the field of intrusion detection. Finally, the paper ends with the conclusion and future aspects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abbass HA (2001) Mbo: marriage in honey bees optimization-a haplometrosis polygynous swarming approach. In: Proceedings of the 2001 congress on evolutionary computation (IEEE Cat. No. 01TH8546), vol 1, IEEE, pp 207–214

  2. Abdechiri M, Meybodi MR, Bahrami H (2013) Gases Brownian motion optimization: an algorithm for optimization (gbmo). Appl Soft Comput 13(5):2932–2946

    Google Scholar 

  3. Abdel-Basset M, Abdel-Fatah L, Sangaiah AK (2018) Metaheuristic algorithms: a comprehensive review. In: Computational intelligence for multimedia big data on the cloud with engineering applications, Elsevier, pp 185–231

  4. Abdullahi IM, Mu’azu MB, Olaniyi OM, Agajo J (2018) Pastoralist optimization algorithm (poa): a novel nature-inspired metaheuristic optimization algorithm. In: International conference on global and emerging trends, pp 101–105

  5. Abedinia O, Amjady N, Ghasemi A (2016) A new metaheuristic algorithm based on shark smell optimization. Complexity 21(5):97–116

    MathSciNet  Google Scholar 

  6. Alatas B (2012) A novel chemistry based metaheuristic optimization method for mining of classification rules. Expert Syst Appl 39(12):11080–11088

    Google Scholar 

  7. Ali MH, Al Mohammed BAD, Ismail A, Zolkipli MF (2018) A new intrusion detection system based on fast learning network and particle swarm optimization. IEEE Access 6:20255–20261

    Google Scholar 

  8. Arivudainambi D, Varun Kumar KA, Sibi Chakkaravarthy S (2019) Lion ids: a meta-heuristics approach to detect ddos attacks against software-defined networks. Neural Comput Appl 31(5):1491–1501

  9. Asil Gharebaghi S, Ardalan Asl M (2017) New meta-heuristic optimization algorithm using neuronal communication. Iran Univ Sci Technol 7(3):413–431

    Google Scholar 

  10. Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1–12

    Google Scholar 

  11. Atashpaz-Gargari E, Lucas C (2007) Imperialist competitive algorithm: an algorithm for optimization inspired by imperialistic competition. In: 2007 IEEE congress on evolutionary computation, IEEE, pp 4661–4667

  12. Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical report

  13. Azad SK, Hasançebi O (2014) An elitist self-adaptive step-size search for structural design optimization. Appl Soft Comput 19:226–235

    Google Scholar 

  14. Azad SK, Hasançebi O, Saka M (2014) Guided stochastic search technique for discrete sizing optimization of steel trusses: A design-driven heuristic approach. Comput Struct 134:62–74

    Google Scholar 

  15. Balajinath B, Raghavan S (2001) Intrusion detection through learning behavior model. Comput Commun 24(12):1202–1212

    Google Scholar 

  16. Bamakan SMH, Wang H, Yingjie T, Shi Y (2016) An effective intrusion detection framework based on mclp/svm optimized by time-varying chaos particle swarm optimization. Neurocomputing 199:90–102

    Google Scholar 

  17. Bandarua S, Debb K (2016) Metaheuristic techniques. In: Decision sciences: theory and practice, Taylor & Francis Group, New York, pp 693–750.

  18. Bastos Filho CJ, de Lima Neto FB, Lins AJ, Nascimento AI, Lima MP (2008) A novel search algorithm based on fish school behavior. In: 2008 IEEE international conference on systems, man and cybernetics, IEEE, pp 2646–2651

  19. Bidar M, Kanan HR, Mouhoub M, Sadaoui S (2018) Mushroom reproduction optimization (mro): a novel nature-inspired evolutionary algorithm. In: 2018 IEEE congress on evolutionary computation (CEC), IEEE, pp 1–10

  20. Biyanto T, Syamsi M, Fibrianto H, Afdanny N, Gunawan K, Rahman A, Pratama J, Abdillah A (2017) Optimization of energy efficiency and conservation in green building design using duelist, killer-whale and rain-water algorithms. In: International conference of applied science and technology for infrastructure engineering

  21. Biyanto TR, Fibrianto HY, Nugroho G, Hatta AM, Listijorini E, Budiati T, Huda H (2016) Duelist algorithm: an algorithm inspired by how duelist improve their capabilities in a duel. In: International conference on swarm intelligence, Springer, pp 39–47

  22. Biyanto TR, Irawan S, Febrianto HY, Afdanny N, Rahman AH, Gunawan KS, Pratama JA, Bethiana TN et al (2017) Killer whale algorithm: an algorithm inspired by the life of killer whale. Procedia Comput Sci 124:151–157

    Google Scholar 

  23. Bodaghi M, Samieefar K (2019) Meta-heuristic bus transportation algorithm. Iran J Comput Sci 2(1):23–32

    Google Scholar 

  24. Bostani H, Sheikhan M (2017) Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems. Soft Comput 21(9):2307–2324

    Google Scholar 

  25. Brammya G, Praveena S, Ninu Preetha N, Ramya R, Rajakumar B, Binu D (2019) Deer hunting optimization algorithm: a new nature-inspired meta-heuristic paradigm. Comput J. https://doi.org/10.1093/comjnl/bxy133/5498233

    Article  Google Scholar 

  26. Brown J, Anwar M, Dozier G (2016) Intrusion detection using a multiple-detector set artificial immune system. In: 2016 IEEE 17th international conference on information reuse and integration (IRI), IEEE, pp 283–286

  27. Bukhtoyarov V, Zhukov V (2014) Ensemble-distributed approach in classification problem solution for intrusion detection systems. In: International conference on intelligent data engineering and automated learning, Springer, pp 255–265

  28. Cannady J, Harrell J (1996) A comparative analysis of current intrusion detection technologies. In: Proceedings of the fourth technology for information security conference, vol 96

  29. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15

    Google Scholar 

  30. ling Chen H, Yang B, jing Wang S, Wang G, zhong Li H, bin Liu W et al (2014) Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy. Appl Math Comput 239:180–197

    MathSciNet  MATH  Google Scholar 

  31. Chen H, Zhu Y, Hu K, He X (2010) Hierarchical swarm model: a new approach to optimization. In: Discrete dynamics in nature and society

  32. Chen J, Cai H, Wang W (2018) A new metaheuristic algorithm: car tracking optimization algorithm. Soft Comput 22(12):3857–3878

    Google Scholar 

  33. Cheng MY, Prayogo D (2014) Symbiotic organisms search: a new metaheuristic optimization algorithm. Comput Struct 139:98–112

    Google Scholar 

  34. Chittur A (2001) Model generation for an intrusion detection system using genetic algorithms. High School Honors Thesis, Ossining High School. In cooperation with Columbia Univ

  35. Chu SC, Tsai PW, Pan JS (2006) Cat swarm optimization. In: Pacific Rim international conference on artificial intelligence, Springer, pp 854–858

  36. Chu Y, Mi H, Liao H, Ji Z, Wu Q (2008) A fast bacterial swarming algorithm for high-dimensional function optimization. In: 2008 IEEE congress on evolutionary computation (IEEE world congress on computational intelligence), IEEE, pp 3135–3140

  37. Chung YY, Wahid N (2012) A hybrid network intrusion detection system using simplified swarm optimization (sso). Appl Soft Comput 12(9):3014–3022

    Google Scholar 

  38. Civicioglu P (2012) Transforming geocentric Cartesian coordinates to geodetic coordinates by using differential search algorithm. Comput Geosci 46:229–247

    Google Scholar 

  39. Civicioglu P (2013) Artificial cooperative search algorithm for numerical optimization problems. Inf Sci 229:58–76

    MATH  Google Scholar 

  40. Civicioglu P (2013) Backtracking search optimization algorithm for numerical optimization problems. Appl Math Comput 219(15):8121–8144

    MathSciNet  MATH  Google Scholar 

  41. Coello CAC, Cortes NC (2005) Solving multiobjective optimization problems using an artificial immune system. Genet Program Evolvable Mach 6(2):163–190

    Google Scholar 

  42. Coello CAC, Zacatenco CSP (2012) List of references on constraint-handling techniques used with evolutionary algorithms. Inf Sci 191:146–168

    Google Scholar 

  43. Colorni A, Dorigo M, Maniezzo V et al (1992) Distributed optimization by ant colonies. In: Proceedings of the first European conference on artificial life, vol 142, Cambridge, MA, pp 134–142

  44. Comellas F, Martinez-Navarro J (2009) Bumblebees: a multiagent combinatorial optimization algorithm inspired by social insect behaviour. In: Proceedings of the first ACM/SIGEVO summit on genetic and evolutionary computation, ACM, pp 811–814

  45. Cortés P, García JM, Muñuzuri J, Onieva L (2008) Viral systems: a new bio-inspired optimization approach. Comput Oper Res 35(9):2840–2860

    MATH  Google Scholar 

  46. Crosbie M, Dole B, Ellis T, Krsul I (1996) E. spa ord. idiot-users guide. Technical report, TR-96-050, Purdue University, COAST Laboratory

  47. Cuevas E, Echavarría A, Ramírez-Ortegón MA (2014) An optimization algorithm inspired by the states of matter that improves the balance between exploration and exploitation. Appl Intell 40(2):256–272

    Google Scholar 

  48. Cuevas E, Oliva D, Zaldivar D, Pérez-Cisneros M, Sossa H (2012) Circle detection using electro-magnetism optimization. Inf Sci 182(1):40–55

    MathSciNet  Google Scholar 

  49. Dai C, Chen W, Zhu Y, Zhang X (2009) Seeker optimization algorithm for optimal reactive power dispatch. IEEE Trans Power Syst 24(3):1218–1231

    Google Scholar 

  50. Danane Y, Parvat T (2015) Intrusion detection system using fuzzy genetic algorithm. In: 2015 International conference on pervasive computing (ICPC), IEEE, pp 1–5

  51. Dasgupta D, Gonzalez F (2001) An intelligent decision support system for intrusion detection and response. In: Information assurance in computer networks, pp 1–14

  52. Dash T (2017) A study on intrusion detection using neural networks trained with evolutionary algorithms. Soft Comput 21(10):2687–2700

    Google Scholar 

  53. Davis L (1991) Bit-climbing, representational bias, and test suite design. In: ICGA, pp 18–23

  54. Deb A (2011) Introduction to soft computing techniques: artificial neural networks, fuzzy logic and genetic algorithms. In: Soft computing in textile engineering, Elsevier, pp 3–24

  55. Debar H, Wespi A (2001) Aggregation and correlation of intrusion-detection alerts. In: Proceedings of recent advances in intrusion detection, Springer, pp 85–103

  56. Deng S, Zhou AH, Yue D, Hu B, Zhu LP (2017) Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system. IET Control Theory Appl 11(11):1822–1829

    MathSciNet  Google Scholar 

  57. Denning D (1987) An intrusion-detection model. IEEE Trans Softw Eng 2:222–232

    Google Scholar 

  58. Deuri J, Sathya SS (2018) Cricket chirping algorithm: an efficient meta-heuristic for numerical function optimisation. Int J Comput Sci Eng 16(2):162–172

    Google Scholar 

  59. Dhal KG, Ray S, Das A, Das S (2019) A survey on nature-inspired optimization algorithms and their application in image enhancement domain. Arch Comput Methods Eng 26(5):1607–1638

    MathSciNet  Google Scholar 

  60. Dhiman G, Kumar V (2017) Spotted hyena optimizer: a novel bio-inspired based metaheuristic technique for engineering applications. Adv Eng Softw 114:48–70

    Google Scholar 

  61. Dhiman G, Kumar V (2018) Emperor penguin optimizer: a bio-inspired algorithm for engineering problems. Knowl Based Syst 159:20–50

    Google Scholar 

  62. Dorigo M (1992) Optimization, learning and natural algorithms. PhD thesis, Politecnico di Milano

  63. Dorigo M, Gambardella LM (1997) Ant colony system: a cooperative learning approach to the traveling salesman problem. IEEE Trans Evol Comput 1(1):53–66

    Google Scholar 

  64. Dougan B, Olmez T (2015) A new metaheuristic for numerical function optimization: Vortex search algorithm. Inf Sci 293:125–145

    Google Scholar 

  65. Drias H, Sadeg S, Yahi S (2005) Cooperative bees swarm for solving the maximum weighted satisfiability problem. In: International work-conference on artificial neural networks, Springer, pp 318–325

  66. Eberhart R, Kennedy J (1995) A new optimizer using particle swarm theory. In: Proceedings of the sixth international symposium on micro machine and human science, MHS’95, IEEE, pp 39–43

  67. Ebrahimi A, Khamehchi E (2016) Sperm whale algorithm: an effective metaheuristic algorithm for production optimization problems. J Nat Gas Sci Eng 29:211–222

    Google Scholar 

  68. Eesa AS, Brifcani AMA, Orman Z (2013) Cuttlefish algorithm—a novel bio-inspired optimization algorithm. Int J Sci Eng Res 4(9):1978–1986

    Google Scholar 

  69. Engen V (2010) Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the kdd cup’99 data set and multi-objective evolution of neural network classifier ensembles from imbalanced data. PhD thesis, Bournemouth University

  70. Eskandar H, Sadollah A, Bahreininejad A, Hamdi M (2012) Water cycle algorithm—a novel metaheuristic optimization method for solving constrained engineering optimization problems. Comput Struct 110:151–166

    Google Scholar 

  71. Eusuff M, Lansey K, Pasha F (2006) Shuffled frog-leaping algorithm: a memetic meta-heuristic for discrete optimization. Eng Optim 38(2):129–154

    MathSciNet  Google Scholar 

  72. Fadakar E, Ebrahimi M (2016) A new metaheuristic football game inspired algorithm. In: 2016 1st Conference on swarm intelligence and evolutionary computation (CSIEC), IEEE, pp 6–11

  73. Farasat A, Menhaj MB, Mansouri T, Moghadam MRS (2010) Aro: a new model-free optimization algorithm inspired from asexual reproduction. Appl Soft Comput 10(4):1284–1292

    Google Scholar 

  74. Ferreira C (2001) Gene expression programming: a new adaptive algorithm for solving problems. arXiv preprint arXiv:cs/0102027

  75. Ferriyan A, Thamrin AH, Takeda K, Murai J (2017) Feature selection using genetic algorithm to improve classification in network intrusion detection system. In: 2017 International electronics symposium on knowledge creation and intelligent computing (IES-KCIC), IEEE, pp 46–49

  76. Fogel LJ, Owens AJ, Walsh MJ (1966) Artificial intelligence through simulated evolution

  77. Fooel L, Owens A, Walsh M (1966) Artificial intelligence through simulated evolution. Wiley, New York

    MATH  Google Scholar 

  78. Formato R (2008) Central force optimization: a new nature inspired computational framework for multidimensional search and optimization. In: Nature inspired cooperative strategies for optimization (NICSO 2007), pp 221–238

  79. Friedl G, Kuczmann M (2015) A new metaheuristic optimization algorithm, the weighted attraction method. Acta Technica Jaurinensis 8(3):257–266

    Google Scholar 

  80. Fulp EW, Gage HD, John DJ, McNiece MR, Turkett WH, Zhou X (2015) An evolutionary strategy for resilient cyber defense. In: Global communications conference (GLOBECOM), IEEE, pp 1–6

  81. Gandomi AH, Alavi AH (2012) Krill herd: a new bio-inspired optimization algorithm. Commun Nonlinear Sci Numer Simul 17(12):4831–4845

    MathSciNet  MATH  Google Scholar 

  82. Garcia-Teodoro P, Diaz-Verdejo J, Macia-Fernandez G, Vazquez E (2009) Anomaly-based network intrusion detection: techniques, systems and challenges. Comput Secur 28(1–2):18–28

    Google Scholar 

  83. Geem ZW, Kim JH, Loganathan GV (2001) A new heuristic optimization algorithm: harmony search. Simulation 76(2):60–68

    Google Scholar 

  84. Glover F (1989) Tabu searchpart i. ORSA J Comput 1(3):190–206

    MATH  Google Scholar 

  85. Gonccalves MS, Lopez RH, Miguel LFF (2015) Search group algorithm: a new metaheuristic method for the optimization of truss structures. Comput Struct 153:165–184

    Google Scholar 

  86. Grandvalet Y, Canu S (2003) Adaptive scaling for feature selection in svms. In: Advances in neural information processing systems, pp 569–576

  87. Haghnegahdar L, Wang Y (2019) A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection. In: Neural computing and applications, pp 1–15

  88. Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Comput Netw 136:37–50

    Google Scholar 

  89. Hasanccebi O, Azad SK (2015) Adaptive dimensional search: a new metaheuristic algorithm for discrete truss sizing optimization. Comput Struct 154:1–16

    Google Scholar 

  90. Hashim FA, Houssein EH, Mabrouk MS, Al-Atabany W, Mirjalili S (2019) Henry gas solubility optimization: a novel physics-based algorithm. Future Gener Comput Syst 101:646–667

    Google Scholar 

  91. Hatamlou A (2013) Black hole: a new heuristic optimization approach for data clustering. Inf Sci 222:175–184

    MathSciNet  Google Scholar 

  92. Havens TC, Spain CJ, Salmon NG, Keller JM (2008) Roach infestation optimization. In: 2008 IEEE swarm intelligence symposium, IEEE, pp 1–7

  93. He S, Wu QH, Saunders J (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973–990

    Google Scholar 

  94. Hedayatzadeh R, Salmassi FA, Keshtgari M, Akbari R, Ziarati K (2010) Termite colony optimization: A novel approach for optimizing continuous problems. In: 2010 18th Iranian conference on electrical engineering, IEEE, pp 553–558

  95. Hernandez H, Blum C (2012) Distributed graph coloring: an approach based on the calling behavior of japanese tree frogs. Swarm Intell 6(2):117–150

    Google Scholar 

  96. Holland JH (1992) Genetic algorithms. Sci Am 267(1):66–73

    Google Scholar 

  97. Hooks D, Yuan X, Roy K, Esterline A, Hernandez J (2018) Applying artificial immune system for intrusion detection. In: 2018 IEEE fourth international conference on big data computing service and applications (BigDataService), IEEE, pp 287–292

  98. Hosseini F, Kaedi M (2018) A metaheuristic optimization algorithm inspired by the effect of sunlight on the leaf germination. Int J Appl Metaheuristic Comput (IJAMC) 9(1):40–48

    Google Scholar 

  99. Huang CL, Dun JF (2008) A distributed pso-svm hybrid system with feature selection and parameter optimization. Appl Soft Comput 8(4):1381–1391

    Google Scholar 

  100. Ibrahim A, Rahnamayan S, Martin MV (2014) Simulated raindrop algorithm for global optimization. In: 2014 IEEE 27th Canadian conference on electrical and computer engineering (CCECE), IEEE, pp 1–8

  101. Iordache S (2010) Consultant-guided search: a new metaheuristic for combinatorial optimization problems. In: Proceedings of the 12th annual conference on Genetic and evolutionary computation, ACM, pp 225–232

  102. Jaderyan M, Khotanlou H (2016) Virulence optimization algorithm. Appl Soft Comput 43:596–618

    Google Scholar 

  103. Jain M, Maurya S, Rani A, Singh V (2018) Owl search algorithm: a novel nature-inspired heuristic paradigm for global optimization. J Intell Fuzzy Syst 34(3):1573–1582

    Google Scholar 

  104. Jain M, Singh V, Rani A (2019) A novel nature-inspired algorithm for optimization: Squirrel search algorithm. Swarm Evol Comput 44:148–175

    Google Scholar 

  105. Jamil M, Yang XS (2013) A literature survey of benchmark functions for global optimization problems. arXiv preprint arXiv:1308.4008

  106. Javidy B, Hatamlou A, Mirjalili S (2015) Ions motion algorithm for solving optimization problems. Appl Soft Comput 32:72–79

    Google Scholar 

  107. Julisch K (2003) Clustering intrusion detection alarms to support root cause analysis. ACM Trans Inf Syst Secur (TISSEC) 6(4):443–471

    Google Scholar 

  108. Jung SH (2003) Queen-bee evolution for genetic algorithms. Electron Lett 39(6):575–576

    Google Scholar 

  109. Kaboli SHA, Selvaraj J, Rahim N (2017) Rain-fall optimization algorithm: a population based algorithm for solving constrained optimization problems. J Comput Sci 19:31–42

    Google Scholar 

  110. Kaedi M (2017) Fractal-based algorithm: a new metaheuristic method for continuous optimization. Int J Artif Intell 15(1):76–92

    Google Scholar 

  111. Kallioras NA, Lagaros ND, Avtzis DN (2018) Pity beetle algorithm-a new metaheuristic inspired by the behavior of bark beetles. Adv Eng Softw 121:147–166

    Google Scholar 

  112. Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (abc) algorithm. J Global Optim 39(3):459–471

    MathSciNet  MATH  Google Scholar 

  113. Kashan AH (2009) League championship algorithm: a new algorithm for numerical function optimization. In: 2009 International conference of soft computing and pattern recognition, IEEE, pp 43–48

  114. Kashan AH (2015) A new metaheuristic for optimization: optics inspired optimization (oio). Comput Oper Res 55:99–125

    MathSciNet  MATH  Google Scholar 

  115. Kashan AH, Tavakkoli-Moghaddam R, Gen M (2019) Find-fix-finish-exploit-analyze (f3ea) meta-heuristic algorithm: an effective algorithm with new evolutionary operators for global optimization. Comput Ind Eng 128:192–218

    Google Scholar 

  116. Kaur A, Pal SK, Singh AP (2018) Hybridization of k-means and firefly algorithm for intrusion detection system. Int J Syst Assur Eng Manag 9(4):901–910

    Google Scholar 

  117. Kaur G, Arora S (2018) Chaotic whale optimization algorithm. J Comput Des Eng 5(3):275–284

    Google Scholar 

  118. Kaveh A, Dadras A (2017) A novel meta-heuristic optimization algorithm: thermal exchange optimization. Adv Eng Softw 110:69–84

    Google Scholar 

  119. Kaveh A, Farhoudi N (2013) A new optimization method: Dolphin echolocation. Adv Eng Softw 59:53–70

    Google Scholar 

  120. Kaveh A, Khayatazad M (2012) A new meta-heuristic method: ray optimization. Comput Struct 112:283–294

    Google Scholar 

  121. Kaveh A, Kooshkebaghi M (2019) Artificial coronary circulation system: a new bio-inspired metaheuristic algorithm. Sci Iran 26(5):2731–2747

    Google Scholar 

  122. Kaveh A, Mahdavi VR (2014) Colliding bodies optimization: a novel meta-heuristic method. Comput Struct 139:18–27

    Google Scholar 

  123. Kaveh A, Talatahari S (2010) A novel heuristic optimization method: charged system search. Acta Mech 213(3):267–289

    MATH  Google Scholar 

  124. Kennedy R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks IV, vol 1000, p 33

  125. Kim JH, Choi YH, Ngo TT, Choi J, Lee HM, Choo YM, Lee EH, Yoo DG, Sadollah A, Jung D (2016) Ku battle of metaheuristic optimization algorithms 1: development of six new/improved algorithms. In: Harmony search algorithm, Springer, pp 197–205

  126. Kirkpatrick S, Gelatt CD, Vecchi MP et al (1983) Optimization by simulated annealing. Science 220(4598):671–680

    MathSciNet  MATH  Google Scholar 

  127. Klein CE, Mariani VC, dos Santos Coelho L (2018) Cheetah based optimization algorithm: a novel swarm intelligence paradigm. In: ESANN

  128. Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30(8):625–642

    Google Scholar 

  129. Koza JR, Koza JR (1992) Genetic programming: on the programming of computers by means of natural selection, vol 1. MIT press, New York

    MATH  Google Scholar 

  130. Krishnanand K, Ghose D (2009) Glowworm swarm optimisation: a new method for optimising multi-modal functions. Int J Comput Intell Stud 1(1):93–119

    Google Scholar 

  131. Kulkarni AJ, Krishnasamy G, Abraham A (2017) Cohort intelligence: a socio-inspired optimization method. Springer, Berlin

    Google Scholar 

  132. Kumar G, Kumar K (2013) Design of an evolutionary approach for intrusion detection. Sci World J

  133. Kumar G, Kumar K, Sachdeva M (2010) The use of artificial intelligence based techniques for intrusion detection: a review. Artif Intell Rev 34(4):369–387

    Google Scholar 

  134. Kumar M, Kulkarni AJ, Satapathy SC (2018) Socio evolution and learning optimization algorithm: a socio-inspired optimization methodology. Future Gener Comput Syst 81:252–272

    Google Scholar 

  135. Lam AY, Li VO (2010) Chemical-reaction-inspired metaheuristic for optimization. IEEE Trans Evol Comput 14(3):381–399

    Google Scholar 

  136. Lamy JB (2019) Artificial feeding birds (afb): a new metaheuristic inspired by the behavior of pigeons. In: Advances in nature-inspired computing and applications, Springer, pp 43–60

  137. Li X (2002) An optimizing method based on autonomous animats: fish-swarm algorithm. Syst Eng Theory Pract 22(11):32–38

    Google Scholar 

  138. Lim S, Jones A (2008) Network anomaly detection system: the state of art of network behaviour analysis. In: Proceedings of international conference on convergence and hybrid information technology (ICHIT), IEEE, pp 459–465

  139. Lin SW, Ying KC, Chen SC, Lee ZJ (2008) Particle swarm optimization for parameter determination and feature selection of support vector machines. Expert Syst Appl 35(4):1817–1824

    Google Scholar 

  140. Liu C, Han M, Wang X (2012) A novel evolutionary membrane algorithm for global numerical optimization. In: 2012 Third international conference on intelligent control and information processing (ICICIP), IEEE, pp 727–732

  141. Lourenco HR, Martin OC, Stutzle T (2003) Iterated local search. In: International series in operations research and management science, pp 321–354

  142. Lucic P, Teodorovic D (2001) Bee system: modeling combinatorial optimization transportation engineering problems by swarm intelligence. In: Preprints of the TRISTAN IV triennial symposium on transportation analysis, pp 441–445

  143. Maia RD, de Castro LN, Caminhas WM (2012) Bee colonies as model for multimodal continuous optimization: The optbees algorithm. In: 2012 IEEE congress on evolutionary computation, IEEE, pp 1–8

  144. Malik AJ, Shahzad W, Khan FA (2011) Binary pso and random forests algorithm for probe attacks detection in a network. In: 2011 IEEE congress on evolutionary computation (CEC), IEEE, pp 662–668

  145. Maniezzo A (1992) Distributed optimization by ant colonies. In: Toward a practice of autonomous systems: proceedings of the first European conference on artificial life, Mit Press, p 134

  146. Masadeh R, Mahafzah BA, Sharieh A (2019) Sea lion optimization algorithm. Sea 10(5)

  147. Mbikayi HK (2012) An evolution strategy approach toward rule-set generation for network intrusion detection systems (ids). arXiv preprint arXiv:1212.0170

  148. Mehrabian AR, Lucas C (2006) A novel numerical optimization algorithm inspired from weed colonization. Ecol Inform 1(4):355–366

    Google Scholar 

  149. Mirjalili S (2015) The ant lion optimizer. Adv Eng Softw 83:80–98

    Google Scholar 

  150. Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl Based Syst 89:228–249

    Google Scholar 

  151. Mirjalili S (2016) Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput Appl 27(4):1053–1073

    MathSciNet  Google Scholar 

  152. Mirjalili S (2016) Sca: a sine cosine algorithm for solving optimization problems. Knowl Based Syst 96:120–133

    Google Scholar 

  153. Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: algorithm and applications

  154. Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163–191

    Google Scholar 

  155. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Google Scholar 

  156. Mirjalili S, Mirjalili SM, Hatamlou A (2016) Multi-verse optimizer: a nature-inspired algorithm for global optimization. Neural Comput Appl 27(2):495–513

    Google Scholar 

  157. Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61

    Google Scholar 

  158. Mirjalili SZ, Mirjalili S, Saremi S, Faris H, Aljarah I (2018) Grasshopper optimization algorithm for multi-objective optimization problems. Appl Intell 48(4):805–820

    Google Scholar 

  159. Moein S, Logeswaran R (2014) Kgmo: a swarm optimization algorithm based on the kinetic energy of gas molecules. Inf Sci 275:127–144

    MathSciNet  Google Scholar 

  160. Montiel O, Castillo O, Melin P, Díaz AR, Sepúlveda R (2007) Human evolutionary model: a new approach to optimization. Inf Sci 177(10):2075–2098

    Google Scholar 

  161. Moosavian N, Roodsari BK (2014) Soccer league competition algorithm: a novel meta-heuristic algorithm for optimal design of water distribution networks. Swarm Evol Comput 17:14–24

    Google Scholar 

  162. Mozaffari A, Fathi A, Behzadipour S (2012) The great salmon run: a novel bio-inspired algorithm for artificial system design and optimisation. Int J Bioinspir Comput 4(5):286–301

    Google Scholar 

  163. Mucherino A, Seref O (2007) Monkey search: a novel metaheuristic search for global optimization. In: AIP conference proceedings, vol 953, AIP, pp 162–173

  164. Nakrani S, Tovey C (2004) On honey bees and dynamic server allocation in internet hosting centers. Adaptive Behav 12(3–4):223–240

    Google Scholar 

  165. Nayak J, Vakula K, Dash PB, Naik B (2019) Kidney-inspired algorithm and fuzzy clustering for biomedical data analysis. In: Big data analytics for intelligent healthcare management, Elsevier, pp 269–281

  166. Oftadeh R, Mahjoob M (2009) A new meta-heuristic optimization algorithm: hunting search. In: 2009 fifth international conference on soft computing, computing with words and perceptions in system analysis, decision and control, IEEE, pp 1–5

  167. Oftadeh R, Mahjoob M, Shariatpanahi M (2010) A novel meta-heuristic optimization algorithm inspired by group hunting of animals: Hunting search. Comput Math Appl 60(7):2087–2098

    MATH  Google Scholar 

  168. Owens S, Levary R (2006) An adaptive expert system approach for intrusion detection. Int J Secur Netw 1(3):206–217

    Google Scholar 

  169. Pan WT (2012) A new fruit fly optimization algorithm: taking the financial distress model as an example. Knowl Based Syst 26:69–74

    Google Scholar 

  170. Parpinelli RS, Lopes HS (2011) An eco-inspired evolutionary algorithm applied to numerical optimization. In: 2011 Third world congress on nature and biologically inspired computing, IEEE, pp 466–471

  171. Parpinelli RS, Lopes HS, Freitas AA (2002) Data mining with an ant colony optimization algorithm. IEEE Trans Evol Comput 6(4):321–332

    MATH  Google Scholar 

  172. Passino KM (2010) Bacterial foraging optimization. Int J Swarm Intell Res (IJSIR) 1(1):1–16

    MathSciNet  Google Scholar 

  173. Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448–3470. https://doi.org/10.1016/j.comnet.2007.02.001. URL http://www.sciencedirect.com/science/article/pii/S138912860700062X

  174. Pattnaik SS, Bakwad KM, Sohi B, Ratho RK, Devi S (2013) Swine influenza models based optimization (simbo). Appl Soft Comput 13(1):628–653

    Google Scholar 

  175. Pelikan M (2005) Bayesian optimization algorithm. In: Hierarchical Bayesian optimization algorithm, Springer, pp 31–48

  176. Pham D, Ghanbarzadeh A, Koc E, Otri S, Rahim S, Zaidi M (2005) The bees algorithm. Technical note, Manufacturing Engineering Centre, Cardiff University, UK

  177. Pham D, Ghanbarzadeh A, Koc E, Otri S, Rahim S, Zaidi M (2011) The bees algorithm—a novel tool for complex optimisation. In: 2nd I* PROMS virtual international conference intelligent production machines and systems

  178. Premaratne U, Samarabandu J, Sidhu T (2009) A new biologically inspired optimization algorithm. In: 2009 international conference on industrial and information systems (ICIIS), IEEE, pp 279–284

  179. Punnathanam V, Kotecha P (2016) Yin-yang-pair optimization: a novel lightweight optimization algorithm. Eng Appl Artif Intell 54:62–79

    Google Scholar 

  180. Rabanal P, Rodriguez I, Rubio F (2007) Using river formation dynamics to design heuristic algorithms. In: International conference on unconventional computation, Springer, pp 163–177

  181. Rajabioun R (2011) Cuckoo optimization algorithm. Appl Soft Comput 11(8):5508–5518

    Google Scholar 

  182. Rao RV, Savsani VJ, Vakharia D (2012) Teaching-learning-based optimization: an optimization method for continuous non-linear large scale problems. Inf Sci 183(1):1–15

    MathSciNet  Google Scholar 

  183. Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) Gsa: a gravitational search algorithm. Inf Sci 179(13):2232–2248

    MATH  Google Scholar 

  184. Razmjooy N, Khalilpour M, Ramezani M (2016) A new meta-heuristic optimization algorithm inspired by fifa world cup competitions: theory and its application in pid designing for avr system. J Control Autom Electr Syst 27(4):419–440

    Google Scholar 

  185. Rechenberg I (1973) Evolution strategy: optimization of technical systems by means of biological evolution, Fromman-Holzboog, Stuttgart, vol 104

  186. Ryan C, Collins JJ, Neill MO (1998) Grammatical evolution: evolving programs for an arbitrary language. In: European conference on genetic programming, Springer, pp 83–96

  187. Sadollah A, Bahreininejad A, Eskandar H, Hamdi M (2013) Mine blast algorithm: a new population based algorithm for solving constrained engineering optimization problems. Appl Soft Comput 13(5):2592–2612

    Google Scholar 

  188. Salcedo-Sanz S, Pastor-Sánchez A, Gallo-Marazuela D, Portilla-Figueras A (2013) A novel coral reefs optimization algorithm for multi-objective problems. In: International conference on intelligent data engineering and automated learning, Springer, pp 326–333

  189. Salmani MH, Eshghi K (2017) A metaheuristic algorithm based on chemotherapy science: Csa. J Optim

  190. Savsani P, Savsani V (2016) Passing vehicle search (pvs): a novel metaheuristic algorithm. Appl Math Model 40(5–6):3951–3978

    Google Scholar 

  191. Seth JK, Chandra S (2018) Mids: metaheuristic based intrusion detection system for cloud using k-nn and mgwo. In: International conference on advances in computing and data sciences, Springer, pp 411–420

  192. Shadravan S, Naji H, Bardsiri VK (2019) The sailfish optimizer: a novel nature-inspired metaheuristic algorithm for solving constrained engineering optimization problems. Eng Appl Artif Intell 80:20–34

    Google Scholar 

  193. Shah-Hosseini H (2009) The intelligent water drops algorithm: a nature-inspired swarm-based optimization algorithm. Int J Bioinspir Comput 1(1–2):71–79

    Google Scholar 

  194. Shah-Hosseini H (2011) Principal components analysis by the galaxy-based search algorithm: a novel metaheuristic for continuous optimisation. Int J Comput Sci Eng 6(1–2):132–140

    Google Scholar 

  195. Shastri AS, Jagetia A, Sehgal A, Patel M, Kulkarni AJ (2019) Expectation algorithm (exa): A socio-inspired optimization methodology. In: Socio-cultural inspired metaheuristics, Springer, pp 193–214

  196. Shayanfar H, Gharehchopogh FS (2018) Farmland fertility: a new metaheuristic algorithm for solving continuous optimization problems. Appl Soft Comput 71:728–746

    Google Scholar 

  197. Shayeghi H, Dadashpour J (2012) Anarchic society optimization based pid control of an automatic voltage regulator (avr) system. Electr Electron Eng 2(4):199–207

    Google Scholar 

  198. Shi Y (2015) An optimization algorithm based on brainstorming process. In: Emerging research on swarm intelligence and algorithm optimization, IGI Global, pp 1–35

  199. Shirazi HM, Namadchian A, khalili Tehrani A (2012) A combined anomaly base intrusion detection using memetic algorithm and bayesian networks. Int J Mach Learn Comput 2(5):706

    Google Scholar 

  200. Shitharth S et al (2017) An enhanced optimization based algorithm for intrusion detection in scada network. Comput Secur 70:16–26

    Google Scholar 

  201. Shrivastava SK, Jain P (2011) Effective anomaly based intrusion detection using rough set theory and support vector machine. Int J Comput Appl 18(3):35–41

    Google Scholar 

  202. Simon D (2008) Biogeography-based optimization. IEEE Trans Evol Comput 12(6):702–713

    Google Scholar 

  203. Singh AP, Kaur A (2019) Flower pollination algorithm for feature analysis of kyoto 2006+ data set. J Inf Optim Sci 40(2):467–478

    Google Scholar 

  204. Singh S, Silakari S (2009) A survey of cyber attack detection systems. Int J Comput Sci Netw Secur 9(5):1–10

    Google Scholar 

  205. Soroush E, Abadeh MS, Habibi J (2006) A boosting ant-colony optimization algorithm for computer intrusion detection. In: Proceedings of the 2006 international symposium on frontiers in networking with applications (FINA 2006)

  206. Sreelaja N, Pai GV (2014) Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Appl Soft Comput 19:68–79

    Google Scholar 

  207. Srinoy S (2007) Intrusion detection model based on particle swarm optimization and support vector machine. In: IEEE symposium on computational intelligence in security and defense applications, CISDA 2007, IEEE, pp 186–192

  208. Stoneburner G (2001) Nist special publication 800-33: underlying technical models for information technology security. Gaithersburg, Estados Unidos de América. National Institute of Standards and Technology (NIST)

  209. Storn R, Price K (1997) Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11(4):341–359

    MathSciNet  MATH  Google Scholar 

  210. Su S, Wang J, Fan W, Yin X (2007) Good lattice swarm algorithm for constrained engineering design optimization. In: 2007 International conference on wireless communications, networking and mobile computing, IEEE, pp 6421–6424

  211. Sur C, Sharma S, Shukla A (2013) Egyptian vulture optimization algorithm—a new nature inspired meta-heuristics for knapsack problem. In: The 9th international conference on computing and information technology (IC2IT2013), Springer, pp 227–237

  212. Tabatabaefar M, Miriestahbanati M, Grégoire JC (2017) Network intrusion detection through artificial immune system. In: 2017 Annual IEEE international systems conference (SysCon), IEEE, pp 1–6

  213. Tahani M, Babayan N (2019) Flow regime algorithm (fra): a physics-based meta-heuristics algorithm. Knowl Inf Syst 60(2):1001–1038

    Google Scholar 

  214. Tamura K, Yasuda K (2011) Spiral dynamics inspired optimization. J Adv Comput Intell Intell Inform 15(8):1116–1122

    Google Scholar 

  215. Tang R, Fong S, Yang XS, Deb S (2012) Wolf search algorithm with ephemeral memory. In: Seventh international conference on digital information management (ICDIM 2012), IEEE, pp 165–172

  216. Thakkar A, Lohiya R (2019) Role of swarm and evolutionary algorithms for intrusion detection system: a survey. In: Swarm and evolutionary computation, p 100631

  217. Ting T, Man KL, Guan SU, Nayel M, Wan K (2012) Weightless swarm algorithm (wsa) for dynamic optimization problems. In: IFIP international conference on network and parallel computing, Springer, pp 508–515

  218. Topal AO, Altun O (2016) A novel meta-heuristic algorithm: dynamic virtual bats algorithm. Inf Sci 354:222–235

    Google Scholar 

  219. Tsang CH, Kwong S, Wang H (2005) Anomaly intrusion detection using multi-objective genetic fuzzy system and agent-based evolutionary computation framework. In: Fifth IEEE international conference on data mining, IEEE, p 4

  220. Turing A (2004) Intelligent machinery (1948). B. Jack Copeland, p 395

  221. Tzanetos A, Dounias G (2017) A new metaheuristic method for optimization: sonar inspired optimization. In: International conference on engineering applications of neural networks, Springer, pp 417–428

  222. Vicsek T, Czirok A, Ben-Jacob E, Cohen I, Shochet O (1995) Novel type of phase transition in a system of self-driven particles. Phys Rev Lett 75(6):1226

    MathSciNet  Google Scholar 

  223. Victoire TA, Sakthivel M (2011) A refined differential evolution algorithm based fuzzy classifier for intrusion detection. Eur J Sci Res 65(2):246–259

    Google Scholar 

  224. Wang GG (2018) Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems. Memetic Comput 10(2):151–164

    Google Scholar 

  225. Wang GG, Deb S, dos Santos Coelho L (2018) Earthworm optimisation algorithm: a bio-inspired metaheuristic algorithm for global optimisation problems. IJBIC 12(1):1–22

    Google Scholar 

  226. Wang J, Hong X, Ren Rr, Li Th (2009) A real-time intrusion detection system based on pso-svm. In: Proceedings of the international workshop on information security and application, pp 319–321

  227. Wedde HF, Farooq M, Zhang Y (2004) Beehive: an efficient fault-tolerant routing algorithm inspired by honey bee behavior. In: International workshop on ant colony optimization and swarm intelligence, Springer, pp 83–94

  228. Wedyan A, Whalley J, Narayanan A (2017) Hydrological cycle algorithm for continuous optimization problems. J Optim

  229. Wolpert DH, Macready WG et al (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67–82

    Google Scholar 

  230. Wu S, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: A review. Appl Soft Comput 10(1):1–35

    Google Scholar 

  231. Xu H, Cao Q, Fang C, Fu Y, Su J, Wei S, Bykovyy P (2018) Application of elephant herd optimization algorithm based on levy flight strategy in intrusion detection. In: 2018 IEEE 4th international symposium on wireless systems within the international conferences on intelligent data acquisition and advanced computing systems (IDAACS-SWS), IEEE, pp 16–20

  232. Yadav A et al (2019) Aefa: artificial electric field algorithm for global optimization. Swarm Evol Comput 48:93–108

    Google Scholar 

  233. Yan GW, Hao ZJ (2013) A novel optimization algorithm based on atmosphere clouds model. Int J Comput Intell Appl 12(01):1350002

    Google Scholar 

  234. Yang XS (2005) Engineering optimizations via nature-inspired virtual bee algorithms. In: International work-conference on the interplay between natural and artificial computation, Springer, pp 317–323

  235. Yang XS (2010) Firefly algorithm, stochastic test functions and design optimisation. Int J Bioinspir Comput 2(2):78–84

    Google Scholar 

  236. Yang XS (2010) A new metaheuristic bat-inspired algorithm. In: Nature inspired cooperative strategies for optimization (NICSO 2010), pp 65–74

  237. Yang XS (2012) Flower pollination algorithm for global optimization. In: UCNC, Springer, pp 240–249

  238. Yang XS (2012) Nature-inspired mateheuristic algorithms: success and new challenges. arXiv preprint arXiv:1211.6658

  239. Yang XS (2014) Nature-inspired optimization algorithms. Elsevier, Amsterdam

    MATH  Google Scholar 

  240. Yang XS, Deb S (2009) Cuckoo search via lévy flights. In: World congress on nature and biologically inspired computing, 2009. NaBIC 2009, IEEE, pp 210–214

  241. Yang XS, Deb S (2010) Eagle strategy using levy walk and firefly algorithms for stochastic optimization. In: Nature inspired cooperative strategies for optimization (NICSO 2010), Springer, pp 101–111

  242. Yang XS, He XS (2019) Mathematical foundations of nature-inspired algorithms. Springer, Berlin

    MATH  Google Scholar 

  243. Yang XS, Lees JM, Morley CT (2006) Application of virtual ant algorithms in the optimization of cfrp shear strengthened precracked structures. In: International conference on computational science, Springer, pp 834–837

  244. Yang XS, Papa J (2016) Bio-inspired computation and its applications in image processing: an overview. In: Bio-inspired computation and applications in image processing, Elsevier, pp 1–24

  245. Yao X, Liu Y, Lin G (1999) Evolutionary programming made faster. IEEE Trans Evol Comput 3(2):82–102

    Google Scholar 

  246. Yazdani M, Jolai F (2016) Lion optimization algorithm (loa): a nature-inspired metaheuristic algorithm. J Comput Des Eng 3(1):24–36

    Google Scholar 

  247. Yilmaz A, Weber GW (2011) Why you should consider nature-inspired optimization methods in financial mathematics. https://doi.org/10.1007/978-1-4614-0231-2_20

  248. Zandi Z, Afjei E, Sedighizadeh M (2012) Reactive power dispatch using big bang-big crunch optimization algorithm for voltage stability enhancement. In: 2012 IEEE international conference on power and energy (PECon), IEEE, pp 239–244

  249. Zang H, Zhang S, Hapeshi K (2010) A review of nature-inspired algorithms. J Bionic Eng 7:S232–S237

    Google Scholar 

  250. Zhang LM, Dahlmann C, Zhang Y (2009) Human-inspired algorithms for continuous function optimization. In: 2009 IEEE international conference on intelligent computing and intelligent systems, vol 1, IEEE, pp 318–321

  251. Zhang Q, Wang R, Yang J, Lewis A, Chiclana F, Yang S (2019) Biology migration algorithm: a new nature-inspired heuristic methodology for global optimization. Soft Comput 23(16):7333–7358

    Google Scholar 

  252. Zheng YJ (2015) Water wave optimization: a new nature-inspired metaheuristic. Comput Oper Res 55:1–11

    MathSciNet  MATH  Google Scholar 

  253. Zheng YJ, Ling HF, Xue JY (2014) Ecogeography-based optimization: enhancing biogeography-based optimization with ecogeographic barriers and differentiations. Comput Oper Res 50:115–127

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gulshan Kumar.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thakur, K., Kumar, G. Nature Inspired Techniques and Applications in Intrusion Detection Systems: Recent Progress and Updated Perspective. Arch Computat Methods Eng 28, 2897–2919 (2021). https://doi.org/10.1007/s11831-020-09481-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11831-020-09481-7

Navigation