Smart Healthcare Applications: Detecting DDoS Attacks Efficiently using Hybrid Firefly Algorithm
Received: 28 November 2024 | Revised: 12 January 2025 | Accepted: 18 January 2025 | Online: 17 February 2025
Corresponding author: Anand Mahendran
Abstract
The rapidly growing and emerging Smart Healthcare Applications (SHA) are reducing the burden on the existing healthcare system caused by limited medical infrastructure and increasing number of diseases. Bio-inspired anomaly-based detection systems are still affected by false positive rates because the approaches are synchronized with user-defined parameters that are unpredictable, resulting in convergence rate, discovery and utilization disparities, algorithm complexity, and unrealistic results. One of the most well-known and effective nature-inspired swarm intelligence metaheuristic algorithms is the Firefly Algorithm (FA). In this work, we propose a Hybridized Firefly Algorithm (HFA) that combines the advantages of the FA and Particle Swarm Optimization (PSO). The bio-inspired HFA is designed to mitigate Distributed Denial-of-Service (DDoS) attacks in SHA. We compare our algorithm with other DDoS attack resistant methods and conclude that our hybrid approach outperforms the existing FAs in terms of accuracy, error prediction, and attack detection time. The statistical results demonstrate the improved accuracy and effectiveness of our proposed HFA model with a higher accuracy of 94.9%, error prediction of 6%, and detection time of 1.12 ms compared to existing DDoS attack detection methods. The proposed HFA methodology is a decentralized architecture, more effective, highly reliable, and available for real-time SHA in terms of monitoring and detecting attacks.
Keywords:
smart healthcare applications, bio-inspired computing, DDoS attack, firefly algorithm, particle swarm optimization, hybridized firefly algorithmDownloads
References
M. A. Tunc, E. Gures, and I. Shayea, "A Survey on IoT Smart Healthcare: Emerging Technologies, Applications, Challenges, and Future Trends." arXiv, Sep. 05, 2021.
Y. K. Saheed and M. O. Arowolo, "Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms," IEEE Access, vol. 9, pp. 161546–161554, 2021.
A. K. Singh, A. Anand, Z. Lv, H. Ko, and A. Mohan, "A Survey on Healthcare Data: A Security Perspective," ACM Transactions on Multimidia Computing Communications and Applications, vol. 17, no. 2s, May 2021, Art. no. 59.
G. Sripriyanka and A. Mahendran, "A study on security privacy issues and solutions in internet of medical things—A review," in Intelligent IoT Systems in Personalized Health Care, A. K. Sangaiah and S. Mukhopadhyay, Eds. Cambridge, MA, USA: Academic Press, 2021, ch. 6, pp. 147–175.
H.-S. Weber, "Multilateral Approaches to Cyber Security Capacity Building: The Rise of Non-Traditional Actors," B.A. thesis, Faculty of Social Sciences, Ludwig-Maximilians-Universität, Munich , Germany, 2022.
N. B. Aissa and M. Guerroumi, "Semi-supervised Statistical Approach for Network Anomaly Detection," Procedia Computer Science, vol. 83, pp. 1090–1095, 2016.
K. O. Adefemi Alimi, K. Ouahada, A. M. Abu-Mahfouz, S. Rimer, and O. A. Alimi, "Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things," Journal of Sensor and Actuator Networks, vol. 11, no. 3, Sep. 2022, Art. no. 32.
K. P. Vijayakumar, K. Pradeep, A. Balasundaram, and M. R. Prusty, "Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network," Processes, vol. 11, no. 4, Apr. 2023, Art. no. 1072.
S. Almufti, "The novel Social Spider Optimization Algorithm: Overview, Modifications, and Applications," Icontech International Journal, vol. 5, no. 2, pp. 32–51, Sep. 2021.
N. Kunhare, R. Tiwari, and J. Dhar, "Particle swarm optimization and feature selection for intrusion detection system," Sādhanā, vol. 45, no. 1, May 2020, Art. no. 109.
D. Jovanovic, M. Antonijevic, M. Stankovic, M. Zivkovic, M. Tanaskovic, and N. Bacanin, "Tuning Machine Learning Models Using a Group Search Firefly Algorithm for Credit Card Fraud Detection," Mathematics, vol. 10, no. 13, Jul. 2022, Art. no. 2272.
B. Pitchaimanickam and G. Murugaboopathi, "A hybrid firefly algorithm with particle swarm optimization for energy efficient optimal cluster head selection in wireless sensor networks," Neural Computing and Applications, vol. 32, no. 12, pp. 7709–7723, Jun. 2020.
S. U. Otor, B. O. Akinyemi, T. A. Aladesanmi, G. A. Aderounmu, and B. H. Kamagaté, "An adaptive bio-inspired optimisation model based on the foraging behaviour of a social spider," Cogent Engineering, vol. 6, no. 1, Jan. 2019, Art. no. 1588681.
S. A. Alshaya, "IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 11992–12000, Dec. 2023.
N. I. Haque, A. A. Khalil, M. A. Rahman, M. H. Amini, and S. I. Ahamed, "BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems," in 2021 IEEE International Conference on Digital Health, Chicago, IL, USA, 2021, pp. 48–58.
S. Dwivedi, M. Vardhan, and S. Tripathi, "Defense against distributed DoS attack detection by using intelligent evolutionary algorithm," International Journal of Computers and Applications, vol. 44, no. 3, pp. 219–229, Mar. 2022.
A. Alharbi, W. Alosaimi, H. Alyami, H. T. Rauf, and R. Damaševičius, "Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things," Electronics, vol. 10, no. 11, Jan. 2021, Art. no. 1341.
R. A. Sowah et al., "Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework," Journal of Sensors, vol. 2020, no. 1, 2020, Art. no. 8868602.
H. HaddadPajouh, R. Khayami, A. Dehghantanha, K.-K. R. Choo, and R. M. Parizi, "AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things," Neural Computing and Applications, vol. 32, no. 20, pp. 16119–16133, Oct. 2020.
S. M. Tahsien, H. Karimipour, and P. Spachos, "Machine learning based solutions for security of Internet of Things (IoT): A survey," Journal of Network and Computer Applications, vol. 161, Jul. 2020, Art. no. 102630.
N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications," Sensors, vol. 21, no. 11, Jun. 2021, Art. no. 3654.
C. Kiennert, Z. Ismail, H. Debar, and J. Leneutre, "A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization," ACM Comput. Surv., vol. 51, no. 5, Aug. 2018, Art. no. 90.
O. Almomani, "A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms," Symmetry, vol. 12, no. 6, Jun. 2020, Art. no. 1046.
G. Sripriyanka and A. Mahendran, "Bio-inspired Computing Techniques for Data Security Challenges and Controls," SN Computer Science, vol. 3, no. 6, Aug. 2022, Art. no. 427.
D. Wang and G. Xu, "Research on the Detection of Network Intrusion Prevention With Svm Based Optimization Algorithm," Informatica, vol. 44, no. 2, Jun. 2020.
H. Grari, A. Azouaoui, and K. Zine-Dine, "A cryptanalytic attack of simplified-AES using ant colony optimization," International Journal of Electrical and Computer Engineering, vol. 9, no. 5, pp. 4287–4295, Oct. 2019.
X. Kan et al., "A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network," Information Sciences, vol. 568, pp. 147–162, Aug. 2021.
R. O. Ogundokun, J. B. Awotunde, P. Sadiku, E. A. Adeniyi, M. Abiodun, and O. I. Dauda, "An Enhanced Intrusion Detection System using Particle Swarm Optimization Feature Extraction Technique," Procedia Computer Science, vol. 193, pp. 504–512, 2021.
A. P. Johnson, H. Al-Aqrabi, and R. Hill, "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems," Sensors, vol. 20, no. 3, Feb. 2020, Art. no. 844.
S. Khanam, I. B. Ahmedy, M. Y. Idna Idris, M. H. Jaward, and A. Q. Bin Md Sabri, "A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things," IEEE Access, vol. 8, pp. 219709–219743, 2020.
N. Jaya Krishna and N. Prasanth, "An Insight View on Denial of Service Attacks in Vehicular Ad Hoc Networks," in Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2021, Udaipur, India, 2021, pp. 273–285.
G. Sripriyanka and A. Mahendran, "Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification," IEEE Access, vol. 12, pp. 17328–17348, 2024.
G. Sripriyanka and A. Mahendran, "Mirai Botnet Attacks on IoT Applications: Challenges and Controls," in Information Systems and Management Science: Conference Proceedings of 4th ISMS 2021, Msida, Malta, 2021, pp. 49–67.
P. Gope and T. Hwang, "BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network," IEEE Sensors Journal, vol. 16, no. 5, pp. 1368–1376, Mar. 2016.
G. Sripriyanka and M. Anand, "Issues and Solution Techniques for IoT Security and Privacy - A Survey," International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 909–928, Oct. 2022.
S. Rengasamy and P. Murugesan, "Performance enhanced Boosted SVM for Imbalanced datasets," Applied Soft Computing, vol. 83, Oct. 2019, Art. no. 105601.
Downloads
How to Cite
License
Copyright (c) 2025 G. Sripriyanka, Anand Mahendran

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.