This is a preview and has not been published. View submission

Smart Healthcare Applications: Detecting DDoS Attacks Efficiently using Hybrid Firefly Algorithm

Authors

  • G. Sripriyanka School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India
  • Anand Mahendran School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamil Nadu, India
Volume: 15 | Issue: 2 | Pages: 21136-21143 | April 2025 | https://doi.org/10.48084/etasr.9760

Abstract

The rapidly growing and emerging Smart Healthcare Applications (SHA) are reducing the burden on the existing healthcare system caused by limited medical infrastructure and increasing number of diseases. Bio-inspired anomaly-based detection systems are still affected by false positive rates because the approaches are synchronized with user-defined parameters that are unpredictable, resulting in convergence rate, discovery and utilization disparities, algorithm complexity, and unrealistic results. One of the most well-known and effective nature-inspired swarm intelligence metaheuristic algorithms is the Firefly Algorithm (FA). In this work, we propose a Hybridized Firefly Algorithm (HFA) that combines the advantages of the FA and Particle Swarm Optimization (PSO). The bio-inspired HFA is designed to mitigate Distributed Denial-of-Service (DDoS) attacks in SHA. We compare our algorithm with other DDoS attack resistant methods and conclude that our hybrid approach outperforms the existing FAs in terms of accuracy, error prediction, and attack detection time. The statistical results demonstrate the improved accuracy and effectiveness of our proposed HFA model with a higher accuracy of 94.9%, error prediction of 6%, and detection time of 1.12 ms compared to existing DDoS attack detection methods. The proposed HFA methodology is a decentralized architecture, more effective, highly reliable, and available for real-time SHA in terms of monitoring and detecting attacks.

Keywords:

smart healthcare applications, bio-inspired computing, DDoS attack, firefly algorithm, particle swarm optimization, hybridized firefly algorithm

Downloads

Download data is not yet available.

References

M. A. Tunc, E. Gures, and I. Shayea, "A Survey on IoT Smart Healthcare: Emerging Technologies, Applications, Challenges, and Future Trends." arXiv, Sep. 05, 2021.

Y. K. Saheed and M. O. Arowolo, "Efficient Cyber Attack Detection on the Internet of Medical Things-Smart Environment Based on Deep Recurrent Neural Network and Machine Learning Algorithms," IEEE Access, vol. 9, pp. 161546–161554, 2021.

A. K. Singh, A. Anand, Z. Lv, H. Ko, and A. Mohan, "A Survey on Healthcare Data: A Security Perspective," ACM Transactions on Multimidia Computing Communications and Applications, vol. 17, no. 2s, May 2021, Art. no. 59.

G. Sripriyanka and A. Mahendran, "A study on security privacy issues and solutions in internet of medical things—A review," in Intelligent IoT Systems in Personalized Health Care, A. K. Sangaiah and S. Mukhopadhyay, Eds. Cambridge, MA, USA: Academic Press, 2021, ch. 6, pp. 147–175.

H.-S. Weber, "Multilateral Approaches to Cyber Security Capacity Building: The Rise of Non-Traditional Actors," B.A. thesis, Faculty of Social Sciences, Ludwig-Maximilians-Universität, Munich , Germany, 2022.

N. B. Aissa and M. Guerroumi, "Semi-supervised Statistical Approach for Network Anomaly Detection," Procedia Computer Science, vol. 83, pp. 1090–1095, 2016.

K. O. Adefemi Alimi, K. Ouahada, A. M. Abu-Mahfouz, S. Rimer, and O. A. Alimi, "Refined LSTM Based Intrusion Detection for Denial-of-Service Attack in Internet of Things," Journal of Sensor and Actuator Networks, vol. 11, no. 3, Sep. 2022, Art. no. 32.

K. P. Vijayakumar, K. Pradeep, A. Balasundaram, and M. R. Prusty, "Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network," Processes, vol. 11, no. 4, Apr. 2023, Art. no. 1072.

S. Almufti, "The novel Social Spider Optimization Algorithm: Overview, Modifications, and Applications," Icontech International Journal, vol. 5, no. 2, pp. 32–51, Sep. 2021.

N. Kunhare, R. Tiwari, and J. Dhar, "Particle swarm optimization and feature selection for intrusion detection system," Sādhanā, vol. 45, no. 1, May 2020, Art. no. 109.

D. Jovanovic, M. Antonijevic, M. Stankovic, M. Zivkovic, M. Tanaskovic, and N. Bacanin, "Tuning Machine Learning Models Using a Group Search Firefly Algorithm for Credit Card Fraud Detection," Mathematics, vol. 10, no. 13, Jul. 2022, Art. no. 2272.

B. Pitchaimanickam and G. Murugaboopathi, "A hybrid firefly algorithm with particle swarm optimization for energy efficient optimal cluster head selection in wireless sensor networks," Neural Computing and Applications, vol. 32, no. 12, pp. 7709–7723, Jun. 2020.

S. U. Otor, B. O. Akinyemi, T. A. Aladesanmi, G. A. Aderounmu, and B. H. Kamagaté, "An adaptive bio-inspired optimisation model based on the foraging behaviour of a social spider," Cogent Engineering, vol. 6, no. 1, Jan. 2019, Art. no. 1588681.

S. A. Alshaya, "IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 11992–12000, Dec. 2023.

N. I. Haque, A. A. Khalil, M. A. Rahman, M. H. Amini, and S. I. Ahamed, "BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems," in 2021 IEEE International Conference on Digital Health, Chicago, IL, USA, 2021, pp. 48–58.

S. Dwivedi, M. Vardhan, and S. Tripathi, "Defense against distributed DoS attack detection by using intelligent evolutionary algorithm," International Journal of Computers and Applications, vol. 44, no. 3, pp. 219–229, Mar. 2022.

A. Alharbi, W. Alosaimi, H. Alyami, H. T. Rauf, and R. Damaševičius, "Botnet Attack Detection Using Local Global Best Bat Algorithm for Industrial Internet of Things," Electronics, vol. 10, no. 11, Jan. 2021, Art. no. 1341.

R. A. Sowah et al., "Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework," Journal of Sensors, vol. 2020, no. 1, 2020, Art. no. 8868602.

H. HaddadPajouh, R. Khayami, A. Dehghantanha, K.-K. R. Choo, and R. M. Parizi, "AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things," Neural Computing and Applications, vol. 32, no. 20, pp. 16119–16133, Oct. 2020.

S. M. Tahsien, H. Karimipour, and P. Spachos, "Machine learning based solutions for security of Internet of Things (IoT): A survey," Journal of Network and Computer Applications, vol. 161, Jul. 2020, Art. no. 102630.

N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, "Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications," Sensors, vol. 21, no. 11, Jun. 2021, Art. no. 3654.

C. Kiennert, Z. Ismail, H. Debar, and J. Leneutre, "A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization," ACM Comput. Surv., vol. 51, no. 5, Aug. 2018, Art. no. 90.

O. Almomani, "A Feature Selection Model for Network Intrusion Detection System Based on PSO, GWO, FFA and GA Algorithms," Symmetry, vol. 12, no. 6, Jun. 2020, Art. no. 1046.

G. Sripriyanka and A. Mahendran, "Bio-inspired Computing Techniques for Data Security Challenges and Controls," SN Computer Science, vol. 3, no. 6, Aug. 2022, Art. no. 427.

D. Wang and G. Xu, "Research on the Detection of Network Intrusion Prevention With Svm Based Optimization Algorithm," Informatica, vol. 44, no. 2, Jun. 2020.

H. Grari, A. Azouaoui, and K. Zine-Dine, "A cryptanalytic attack of simplified-AES using ant colony optimization," International Journal of Electrical and Computer Engineering, vol. 9, no. 5, pp. 4287–4295, Oct. 2019.

X. Kan et al., "A novel IoT network intrusion detection approach based on Adaptive Particle Swarm Optimization Convolutional Neural Network," Information Sciences, vol. 568, pp. 147–162, Aug. 2021.

R. O. Ogundokun, J. B. Awotunde, P. Sadiku, E. A. Adeniyi, M. Abiodun, and O. I. Dauda, "An Enhanced Intrusion Detection System using Particle Swarm Optimization Feature Extraction Technique," Procedia Computer Science, vol. 193, pp. 504–512, 2021.

A. P. Johnson, H. Al-Aqrabi, and R. Hill, "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems," Sensors, vol. 20, no. 3, Feb. 2020, Art. no. 844.

S. Khanam, I. B. Ahmedy, M. Y. Idna Idris, M. H. Jaward, and A. Q. Bin Md Sabri, "A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things," IEEE Access, vol. 8, pp. 219709–219743, 2020.

N. Jaya Krishna and N. Prasanth, "An Insight View on Denial of Service Attacks in Vehicular Ad Hoc Networks," in Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2021, Udaipur, India, 2021, pp. 273–285.

G. Sripriyanka and A. Mahendran, "Securing IoMT: A Hybrid Model for DDoS Attack Detection and COVID-19 Classification," IEEE Access, vol. 12, pp. 17328–17348, 2024.

G. Sripriyanka and A. Mahendran, "Mirai Botnet Attacks on IoT Applications: Challenges and Controls," in Information Systems and Management Science: Conference Proceedings of 4th ISMS 2021, Msida, Malta, 2021, pp. 49–67.

P. Gope and T. Hwang, "BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network," IEEE Sensors Journal, vol. 16, no. 5, pp. 1368–1376, Mar. 2016.

G. Sripriyanka and M. Anand, "Issues and Solution Techniques for IoT Security and Privacy - A Survey," International Journal of Computing and Digital Systems, vol. 12, no. 4, pp. 909–928, Oct. 2022.

S. Rengasamy and P. Murugesan, "Performance enhanced Boosted SVM for Imbalanced datasets," Applied Soft Computing, vol. 83, Oct. 2019, Art. no. 105601.

Downloads

How to Cite

[1]
Sripriyanka, G. and Mahendran, A. 2025. Smart Healthcare Applications: Detecting DDoS Attacks Efficiently using Hybrid Firefly Algorithm. Engineering, Technology & Applied Science Research. 15, 2 (Apr. 2025), 21136–21143. DOI:https://doi.org/10.48084/etasr.9760.

Metrics

Abstract Views: 12
PDF Downloads: 7

Metrics Information