A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
dc.authorscopusid | 57214871038 | |
dc.authorscopusid | 57249416400 | |
dc.authorscopusid | 54897517900 | |
dc.authorscopusid | 55897274300 | |
dc.contributor.author | Hu, Wengui | |
dc.contributor.author | Cao, Qingsong | |
dc.contributor.author | Darbandi, Mehdi | |
dc.contributor.author | Navimipour, Nima Jafari | |
dc.date.accessioned | 2024-06-23T21:37:34Z | |
dc.date.available | 2024-06-23T21:37:34Z | |
dc.date.issued | 2024 | |
dc.department | Kadir Has University | en_US |
dc.department-temp | [Hu, Wengui] Jiangxi Univ Technol, Sch Informat Engn, Nanchang 330098, Jiangxi, Peoples R China; [Cao, Qingsong] Jiangxi Univ Technol, Sch Informat Engn, Nanchang 330098, Jiangxi, Peoples R China; [Darbandi, Mehdi] Pole Univ Leonard de Vinci, Paris, France; [Navimipour, Nima Jafari] Dept Comp Engn, Kadir Has Univ, TR-34085 Istanbul, Turkiye; [Navimipour, Nima Jafari] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu 64002, Yunlin, Taiwan | en_US |
dc.description.abstract | The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce sensitive and personal data has rapidly increased in recent years. The IoT is a new model that integrates physical objects and the Internet and has become one of the principal technological evolutions of computing. Cloud computing is a paradigm for centralized computing that gathers resources in one place and makes them available to consumers via the Internet. Despite the vast array of resources that cloud computing offers, real-time mobile applications might not find it acceptable because it is typically located far from users. However, in applications where low latency and high dependability are required, edge computing-which disperses resources to the network edge-is becoming more and more popular. Though it has less processing power than traditional cloud computing, edge computing offers resources in a decentralized way that can react to customers' needs more quickly. There has been a sharp increase in attackers stealing data from these applications since the data is so sensitive. Thus, a powerful Intrusion Detection System (IDS) that can identify intruders is required. IDS are essential for the cybersecurity of the IoT, cloud, and edge architectures. Investigators have mostly embraced the use of deep learning algorithms as a means of protecting the IoT environment. However, these techniques have some issues with computational complexity, long processing times, and poor precision. Feature selection approaches can be utilized to overcome these problems. Optimization methods, including bio-inspired algorithms, are applied as feature selection approaches to enhance the classification accuracy of IDS systems. Based on the cited sources, it appears that no study has looked into these difficulties in depth. This research thoroughly analyzes the current literature on intrusion detection and using nature-inspired algorithms to safeguard IoT and cloud/edge settings. This article examines pertinent analyses and surveys on the aforementioned subjects, dangers, and outlooks. It also examines many frequently used algorithms in the development of IDSs used in IoT security. The findings demonstrate their efficiency in addressing IoT and cloud/edge ecosystem security issues. Moreover, it has been shown that the methods put out in the literature might improve IDS security and dependability in terms of precision and execution speed. | en_US |
dc.description.sponsorship | Jiangxi Provincial Department of Education Science and Technology | en_US |
dc.description.sponsorship | No Statement Available | en_US |
dc.identifier.citation | 0 | |
dc.identifier.doi | 10.1007/s10586-024-04385-8 | |
dc.identifier.issn | 1386-7857 | |
dc.identifier.issn | 1573-7543 | |
dc.identifier.scopus | 2-s2.0-85191747692 | |
dc.identifier.scopusquality | Q1 | |
dc.identifier.uri | https://doi.org/10.1007/s10586-024-04385-8 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12469/5730 | |
dc.identifier.wos | WOS:001208643500001 | |
dc.identifier.wosquality | N/A | |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.publicationcategory | Diğer | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Nature-inspired algorithms | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Intrusion detection systems | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Internet of Things | en_US |
dc.title | A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions | en_US |
dc.type | Review | en_US |
dspace.entity.type | Publication |