Optimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset

dc.contributor.authorNajafi Mohsenabad, Hadi
dc.contributor.authorTut, Mehmet Ali
dc.date.accessioned2026-02-06T18:24:00Z
dc.date.issued2024
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractIn computer network security, the escalating use of computer networks and the corresponding increase in cyberattacks have propelled Intrusion Detection Systems (IDSs) to the forefront of research in computer science. IDSs are a crucial security technology that diligently monitor network traffic and host activities to identify unauthorized or malicious behavior. This study develops highly accurate models for detecting a diverse range of cyberattacks using the fewest possible features, achieved via a meticulous selection of features. We chose 5, 9, and 10 features, respectively, using the Artificial Bee Colony (ABC), Flower Pollination Algorithm (FPA), and Ant Colony Optimization (ACO) feature-selection techniques. We successfully constructed different models with a remarkable detection accuracy of over 98.8% (approximately 99.0%) with Ant Colony Optimization (ACO), an accuracy of 98.7% with the Flower Pollination Algorithm (FPA), and an accuracy of 98.6% with the Artificial Bee Colony (ABC). Another achievement of this study is the minimum model building time achieved in intrusion detection, which was equal to 1 s using the Flower Pollination Algorithm (FPA), 2 s using the Artificial Bee Colony (ABC), and 3 s using Ant Colony Optimization (ACO). Our research leverages the comprehensive and up-to-date CSE-CIC-IDS2018 dataset and uses the preprocessing Discretize technique to discretize data. Furthermore, our research provides valuable recommendations to network administrators, aiding them in selecting appropriate machine learning algorithms tailored to specific requirements.
dc.identifier.doi10.3390/app14031044
dc.identifier.issn2076-3417
dc.identifier.issue3
dc.identifier.scopus2-s2.0-85192493411
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.3390/app14031044
dc.identifier.urihttps://hdl.handle.net/11129/9990
dc.identifier.volume14
dc.identifier.wosWOS:001159112200001
dc.identifier.wosqualityQ2
dc.indekslendigikaynakWeb of Science
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherMdpi
dc.relation.ispartofApplied Sciences-Basel
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/openAccess
dc.snmzKA_WoS_20260204
dc.subjectmachine learning
dc.subjectnetwork security
dc.subjectfeature selection
dc.subjectIntrusion Detection Systems
dc.subjectdeep learning
dc.subjectcyberattack
dc.subjectcomputer science
dc.titleOptimizing Cybersecurity Attack Detection in Computer Networks: A Comparative Analysis of Bio-Inspired Optimization Algorithms Using the CSE-CIC-IDS 2018 Dataset
dc.typeArticle

Files