Review Article

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection

Table 2

Comparative study of metaheuristic algorithms.

FeaturesPSOGAACOAISABCBFA

RepresentationDimensional vector for position speed, the best stateBinary, real list of rules, permutation of elementsUndirected graphAttribute str. (a real-valued vector), integer string, binary string symbolic stringD-dimensional vector (xi = 1, 2, …, D)Represents i-th bacterium at jth chemotactic, k-th reproductive, and l-th dispersal step

Operatorsinitializer, update, and evaluatorCrossover, mutation, selection, inversionPheromone update and measure, trail evaporationImmune operators cloning, hypermutation and selection based on elitismReproduction, replacement of bee, selectionReproduction, chemotaxis, dispersion, elimination

Datasets for attack detectionKDDCUP99, DARPA98, NSL-KDDKDDCUP99, DARPA98KDDCUP99, DARPA98KDDCUP99, DARPA98, LLDOSKDDCUP99, DARPA98KDDCUP99, DARPA98

Permittivity against DoS attackHighLowHighLowLowLow

Structure and dynamicsDiscrete and network components and evolution or learning basedDiscrete and network components and evolution basedDiscrete components and evolution and learning basedDiscrete and network components and evolution or learning basedDiscrete and components and evolution basedDiscrete and network components and evolution or learning based

ReliabilityHighLowHighHighLowLow

Time-consumingTime-consuming because of its complexity but the no. of repetitions is lessLow time-consuming because of its simplicity but the no. of repetitions is highTime-consuming because of its complexityLow time-consuming because of its simplicityLow time-consuming because of its simplicityLow time-consuming because of its simplicity

RobustnessHighLow as compared to PSO, but more than othersLower than PSO and GA, more than othersLower than ACO betterLowestHigher than ABS

ParametersNumber of particles, dimension of particles, range of particles, maximum number of iterations, inertia weightPopulation size, max generation number, cross-over probabilityNumber of ants, iterations, pheromone evaporation rate, amount of reinforcementPopulation size, no. of antibodies to be selected for hypermutation, number of antibodies to be replacedNo. of food sources which is equal to the no. of employed onlooker beesThe dimension of the search space, number of bacteria, number of steps chemotactic, no. of elimination and dispersal events, no. of reproduction steps, probability

ApplicationsPower system optimization problems, multimodel problems, multiobjective, dynamic, constrained, and combinatorial optimization problems, anomaly detection, sequential ordering problem, etc.Pattern recognition, reactive power dispatch, sensor-based robot path planning, multiobjective vehicle routing problem, molecular modeling, web service selection, etc.Continuous optimization and parallel processing implementations. Vehicle routing problem, graph coloring and set covering, agent-based dynamic scheduling, etc.Computer security, anomaly detection, clustering/classification, numeric function optimization, virus detection, pattern recognition, etc.Solving reliability redundancy allocation problem, training neural networks, XOR, decoder-encoder, and 3-bit parity benchmark problems, pattern classification, etc.Application for harmonic estimation problem in power systems, the parameters of membership functions, and the weights of rules of a fuzzy rule set are estimated, etc.