ENHANCED GREY WOLF OPTIMIZER WITH DYNAMIC ENCIRCLING AND FITNESS-BASED BLENDING FOR CYBERATTACK DETECTION USING SELF-ORGANIZING FUZZY NEURAL NETWORK

Authors

  • Sharaf Aldeen Abdulkadhum Abbas Department of Electrical and Computer Engineering, Altinbas University

DOI:

https://doi.org/10.18623/rvd.v23.5674

Keywords:

Cybersecurity, Wolf Optimization Algorithm, Stacked Fuzzy Neural Network, Precision, Recall

Abstract

Intrusion Detection Systems (IDS) has an intrinsic role in protecting contemporary networks against developing cyberattacks. Still, current IDSs suffer from high false positives, low resistance to novel attacks, and inferior feature selection in heavy traffic. This paper introduces a new and improved Grey Wolf Optimizer (GWO) with adaptive mechanisms that enhance exploration and exploitation capabilities in complex search spaces. A sigmoid adaptive decay function and leader-spiral motion boost search efficiency and rate of convergence. A dynamic encircling mechanism weighted by fitness adjusts the search based on wolf fitness, increasing diversity and accuracy in the search. A Fitness Difference-Based Blending Mechanism (FDBM) enhances position updates by utilizing elite wolves' positional differences, maximizing flexibility and accuracy. The chosen features are treated with a Self-Organizing Stacked Fuzzy Neural Network (SOSFNN) to cope better with the dynamics and for better accuracy of detection in dynamic environments. The model provides 98.22% accuracy, 94.92% precision, 94.48% recall, and 94.67% F1-score, with a minimal false positive (0.0007 for UNSW-NB15 and 1.14% for CICIDS-2018). Our proposed improvements illustrate better detection efficiency and lower temporal complexity (27.10s for CICIDS-2018 and 15.10s for UNSW-NB15) compared to state-of-the-art studies, thus being highly accurate, adaptable, and effective for real-time IDS applications.

References

1. Heidari, A., & Jabraeil Jamali, M. A. (2023). Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Computing, 26(6), 3753-3780.

2. Sindiramutty, S. R., Prabagaran, K. R. V., Jhanjhi, N. Z., Murugesan, R. K., Brohi, S. N.,&Masud, M. (2025). Generative AI in Network Security and Intrusion Detection. In Reshaping CyberSecurity With Generative AI Techniques (pp. 77-124). IGI Global.

3. Ahmed, U., Nazir, M., Sarwar, A., Ali, T., Aggoune, E. H. M., Shahzad, T., & Khan, M. A. (2025). Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy Clustering. Scientific Reports, 15(1), 1726.

4. Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine learning in cybersecurity: a comprehensive survey. The Journal of Defense Modeling and Simulation, 19(1), 57-106.

5. Pourkamali-Anaraki, F.,&Hariri-Ardebili, M. A. (2021). Neural networks and imbalanced learning for data-driven scientific computing with uncertainties. IEEE Access, 9, 15334-15350.

6. Dey, A. K., Gupta, G. P., & Sahu, S. P. (2023). A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks. Decision Analytics Journal, 7, 100206.

7. Devika, G.,&Karegowda, A. G. (2023). Bio-inspired optimization: algorithm, analysis and scope of application. In Swarm Intelligence-Recent Advances and Current Applications. IntechOpen.

8. Darvishpoor, S., Darvishpour, A., Escarcega, M., & Hassanalian, M. (2023). Nature-inspired algorithms from oceans to space: A comprehensive review of heuristic and meta-heuristic optimization algorithms and their potential applications in drones. Drones, 7(7), 427.

9. Pham, T. H., & Raahemi, B. (2023). Bio-inspired feature selection algorithms with their applications: a systematic literature review. IEEE Access, 11, 43733-43758.

10. Ramalingam, R., Shobana, J., Arthi, K., Elangovan, G., Radha, S., & Priyanka, N. (2024). An Extensive Investigation of Meta-Heuristics Algorithms for Optimization Problems. In Metaheuristics Algorithm and Optimization of Engineering and Complex Systems (pp. 223-241). IGI Global.

11. Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf optimizer. Advances in engineering software, 69, 46-61.

12. Alzaqebah, A., Aljarah, I., Al-Kadi, O., & Damaševičius, R. (2022). A modified grey wolf optimization algorithm for an intrusion detection system. Mathematics, 10(6), 999.

13. Liu, L., Li, L., Nian, H., Lu, Y., Zhao, H., & Chen, Y. (2023). Enhanced grey wolf optimization algorithm for mobile robot path planning. Electronics, 12(19), 4026.

14. Yu, M., Xu, J., Liang, W., Qiu, Y., Bao, S., & Tang, L. (2024). Improved multi-strategy adaptive Grey Wolf Optimization for practical engineering applications and high-dimensional problem solving. Artificial Intelligence Review, 57(10), 277.

15. Kwan, H. K., & Cai, Y. (1994). A fuzzy neural network and its application to pattern recognition. IEEE transactions on Fuzzy Systems, 2(3), 185-193.

16. Moustafa, N.,&Slay, J. (2015, November). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS) (pp. 1-6). IEEE.

17. Stiawan, D., Idris, M. Y. B., Bamhdi, A. M., & Budiarto, R. (2020). CICIDS-2017 dataset feature analysis with information gain for anomaly detection. IEEE Access, 8, 132911-132921.

18. Anguita, D., Ghelardoni, L., Ghio, A., Oneto, L.,&Ridella, S. (2012, April). The'K'in K-fold Cross Validation. In ESANN (Vol. 102, pp. 441-446).

19. Srilatha, D., & Shyam, G. K. (2021). Cloud-based intrusion detection using kernel fuzzy clustering and optimal type-2 fuzzy neural network. Cluster Computing, 24(3), 2657-2672.

20. Kunhare, N., Tiwari, R.,&Dhar, J. (2022). Intrusion detection system using hybrid classifiers with meta-heuristic algorithms for the optimization and feature selection by genetic algorithm. Computers and Electrical Engineering, 103, 108383.

21. Saritha, A., Reddy, B. R., & Babu, A. S. (2022). QEMDD: Quantum inspired ensemble model to detect and mitigate DDoS attacks at various layers of SDN architecture. Wireless Personal Communications, 127(3), 2365-2390.

22. Ghanbarzadeh, R., Hosseinalipour, A.,&Ghaffari, A. (2023). A novel network intrusion detection method based on metaheuristic optimisation algorithms. Journal of ambient intelligence and humanized computing, 14(6), 7575-7592.

23. Jain, D. K., Ding, W., & Kotecha, K. (2023). Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment. International Journal of Machine Learning and Cybernetics, 14(6), 2221-2237.

24. Ninu, S. B. (2023). An intrusion detection system using exponential Henry gas solubility optimization based deep neuro fuzzy network in MANET. Engineering Applications of Artificial Intelligence, 123, 105969.

25. Ishaque, M., Johar, M. G. M., Khatibi, A., & Yamin, M. (2023). A novel hybrid technique using fuzzy logic, neural networks and genetic algorithm for intrusion detection system. Measurement: Sensors, 30, 100933.

26. Subramani, S., & Selvi, M. (2023). Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network. Neural Computing and Applications, 35(20), 15201-15220.

27. Wu, X., Jin, Z., Zhou, J., & Duan, C. (2023). Quantum walks-based classification model with resistance for cloud computing attacks. Expert Systems with Applications, 232, 120894.

28. Maazalahi, M., & Hosseini, S. (2024). K-means and meta-heuristic algorithms for intrusion detection systems. Cluster Computing, 1-43.

29. Subramanian, G., & Chinnadurai, M. (2024). Hybrid Quantum enhanced federated learning for cyber attack detection. Scientific Reports, 14(1), 32038.

30. Bhadani, V., Singh, A., Kumar, V., & Gaurav, K. (2024). Nature-inspired optimal tuning of input membership functions of fuzzy inference system for groundwater level prediction. Environmental Modelling & Software, 175, 105995.

31. Ravindran, S. (2024). Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in wsn. Peer-to-Peer Networking and Applications, 1-17.

32. De Maesschalck, R., Jouan-Rimbaud, D., & Massart, D. L. (2000). The mahalanobis distance. Chemometrics and intelligent laboratory systems, 50(1), 1-18.

33. Lancaster, H. O., & Seneta, E. (2005). Chi‐square distribution. Encyclopedia of biostatistics, 2.

34. Patro, S. G. O. P. A. L., & Sahu, K. K. (2015). Normalization: A preprocessing stage. arXiv preprint arXiv:1503.06462.

35. Ul Haq, I., Gondal, I., Vamplew, P., & Brown, S. (2019). Categorical features transformation with compact one-hot encoder for fraud detection in distributed environment. In Data Mining: 16th Australasian Conference, AusDM 2018, Bahrurst, NSW, Australia, November 28–30, 2018, Revised Selected Papers 16 (pp. 69-80). Springer Singapore.

36. Larsen, B. S. (2022). Synthetic minority over-sampling technique (SMOTE). GitHub (https://github. com/dkbsl/matlab_smote/releases/tag/1.0).

37. Kyurkchiev, N., & Markov, S. (2015). Sigmoid functions: some approximation and modelling aspects. LAP LAMBERT Academic Publishing, Saarbrucken, 4, 34.

38. Vesanto, J., & Alhoniemi, E. (2000). Clustering of the self-organizing map. IEEE Transactions on neural networks, 11(3), 586-600.

39. Amin, F., & Mahmoud, M. (2022). Confusion matrix in binary classification problems: A step-by-step tutorial. Journal of Engineering Research, 6(5), 0-0.

40. Aronoff, S. (1982). Classification accuracy: a user approach. Photogrammetric Engineering and Remote Sensing, 48(8), 1299-1307.

41. Yacouby, R., & Axman, D. (2020, November). Probabilistic extension of precision, recall, and f1 score for more thorough evaluation of classification models. In Proceedings of the first workshop on evaluation and comparison of NLP systems (pp. 79-91).

42. Pietraszek, T. (2004). Using adaptive alert classification to reduce false positives in intrusion detection. In Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings 7 (pp. 102-124). Springer Berlin Heidelberg.

43. Ho, C. Y., Lai, Y. C., Chen, I. W., Wang, F. Y., & Tai, W. H. (2012). Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems. IEEE Communications Magazine, 50(3), 146-154.

44. Turner, J. R. (2020). Area under the curve (AUC). Encyclopedia of Behavioral Medicine, 146-146.

45. Tiwari, A. (2023). A hybrid feature selection method using an improved binary butterfly optimization algorithm and adaptive β–hill climbing. IEEE Access, 11, 93511-93537.

46. Shekar, B. H., & Dagnew, G. (2019, February). Grid search-based hyperparameter tuning and classification of microarray cancer data. In 2019 second international conference on advanced computational and communication paradigms (ICACCP) (pp. 1-8). IEEE.

47. Hnamte, V., & Hussain, J. (2023). DCNNBiLSTM: An efficient hybrid deep learning-based intrusion detection system. Telematics and Informatics Reports, 10, 100053.

48. Talukder, M. A., Sharmin, S., Uddin, M. A., Islam, M. M., & Aryal, S. (2024). MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs. International Journal of Information Security, 23(3), 2139-2158.

49. Asif, M., Abbas, S., Khan, M. A., Fatima, A., Khan, M. A.,&Lee, S. W. (2022). MapReduce based intelligent model for intrusion detection using machine learning technique. Journal of King Saud University-Computer and Information Sciences, 34(10), 9723-9731.

50. Saheed, Y. K., Abiodun, A. I., Misra, S., Holone, M. K.,&Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395-9409.

51. Wu, Z., Zhang, H., Wang, P., & Sun, Z. (2022). RTIDS: A robust transformer-based approach for intrusion detection system. IEEE Access, 10, 64375-64387.

52. Zhang, H., Sun, J., Wang, Y., Shi, J., & Xu, Z. (2022). Variational reinforcement learning for hyper-parameter tuning of adaptive evolutionary algorithm. IEEE Transactions on Emerging Topics in Computational Intelligence, 7(5), 1511-1526.

53. Alzubaidi, A.,&Kalita, J. (2016). Authentication of smartphone users using behavioral biometrics. IEEE Communications Surveys&Tutorials, 18(3), 1998-2026.

54. Cha, J., Singh, S. K., Pan, Y., & Park, J. H. (2020). Blockchain-based cyber threat intelligence system architecture for sustainable computing. Sustainability, 12(16), 6401.

55. Islam, M. M., & Iqbal, T. (2021). Multi-gat: A graphical attention-based hierarchical multimodal representation learning approach for human activity recognition. IEEE Robotics and Automation Letters, 6(2), 1729-1736.

56. Abd-Alsabour, N. (2014, October). A review on evolutionary feature selection. In 2014 European Modelling Symposium (pp. 20-26). IEEE.

Downloads

Published

2026-04-01

How to Cite

Abbas, S. A. A. (2026). ENHANCED GREY WOLF OPTIMIZER WITH DYNAMIC ENCIRCLING AND FITNESS-BASED BLENDING FOR CYBERATTACK DETECTION USING SELF-ORGANIZING FUZZY NEURAL NETWORK. Veredas Do Direito, 23(5), e235674. https://doi.org/10.18623/rvd.v23.5674