{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:52:18Z","timestamp":1769838738743,"version":"3.49.0"},"reference-count":92,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T00:00:00Z","timestamp":1623628800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,6,14]]},"abstract":"<jats:p>Now a day\u2019s advancement in technology increases the use of automation, mobility, smart devices, and application over the Internet that can create serious problems for protection and the privacy of digital data and raised the global security issues. Therefore, the necessity of intelligent systems or techniques can prevent and protect the data over the network. Cyberattack is the most prominent problem of cybersecurity and now a challenging area of research for scientists and researchers. These attacks may destroy data, system, and resources and sometimes may damage the whole network. Previously numerous traditional techniques were used for the detection and mitigation of cyberattack, but the techniques are not efficient for new attacks. Today\u2019s machine learning and metaheuristic techniques are popularly applied in different areas to achieve efficient computation and fast processing of complex data of the network. This paper is discussing the improvements and enhancement of security models, frameworks for the detection of cyberattacks, and prevention by using different machine learning and optimization techniques in the domain of cybersecurity. This paper is focused on the literature of different metaheuristic algorithms for optimal feature selection and machine learning techniques for the classification of attacks, and some of the prominent algorithms such as GA, evolutionary, PSO, machine learning, and others are discussed in detail. This study provides descriptions and tutorials that can be referred from various literature citations, references, or latest research papers. The techniques discussed are efficiently applied with high performance for detection, mitigation, and identification of cyberattacks and provide a security mechanism over the network. Hence, this survey presents the description of various existing intelligent techniques, attack datasets, different observations, and comparative studies in detail.<\/jats:p>","DOI":"10.1155\/2021\/5561816","type":"journal-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T00:50:05Z","timestamp":1623718205000},"page":"1-23","source":"Crossref","is-referenced-by-count":17,"title":["Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5579-4835","authenticated-orcid":true,"given":"Priyanka","family":"Dixit","sequence":"first","affiliation":[{"name":"RGPV University, Bhopal, Madhya Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0992-4923","authenticated-orcid":true,"given":"Rashi","family":"Kohli","sequence":"additional","affiliation":[{"name":"IEEE, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8774-3282","authenticated-orcid":true,"given":"Angel","family":"Acevedo-Duque","sequence":"additional","affiliation":[{"name":"Faculty of Business and Administration, Public Policy Observatory, Universidad Aut\u00f3noma de Chile, Santiago, Chile"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7529-8847","authenticated-orcid":true,"given":"Romel Ramon","family":"Gonzalez-Diaz","sequence":"additional","affiliation":[{"name":"Centro Internacional de Investigaci\u00f3ny Desarrollo (CIID), Monteria 230001, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3285-7346","authenticated-orcid":true,"given":"Rutvij H.","family":"Jhaveri","sequence":"additional","affiliation":[{"name":"Pandit Deendayal Energy University, Gandhinagar, Gujarat, India"}]}],"member":"311","reference":[{"key":"1","article-title":"Intelligent feature selection and classification techniques for intrusion detection in networks: a survey","volume":"271","author":"S. Ganapathy","year":"2013","journal-title":"Journal of Wireless Networking and Communications"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2494502"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v12.i3.pp1312-1319"},{"key":"4","article-title":"Review on detection and prevention schemes for flooding attack in WSNS","volume":"3","author":"S. Deol","year":"2017","journal-title":"International Journal of Advance Research Ideas and Innovations in Technology"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2019.2927913"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1728303"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3390\/app9112375"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2954791"},{"key":"9","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.comcom.2020.05.048","article-title":"An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture","volume":"160","author":"R. M.","year":"2020","journal-title":"Computer Communications"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2908998"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100317"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-020-00733-2"},{"key":"13","first-page":"1","article-title":"Implementing an agent-based multi-natural language anti-spam mode","author":"M. A. Mohammed"},{"key":"14","first-page":"138","article-title":"Feature selection using PSO-SVM","volume":"33","author":"C. J. Tu","year":"2006","journal-title":"IAENG International Journal Of Computer Science (IJCS)"},{"issue":"10","key":"15","article-title":"Using meta heuristic algorithms of genetic, particle swarm optimization and glowworm in the intrusion detection system","volume":"16","author":"M. Athari","year":"2016","journal-title":"International Journal of Computer Science and Network Security"},{"key":"16","article-title":"Natural Security: how biological systems use the information to adapt in an unpredictable world","volume":"14","author":"R. D. Sagarin","year":"2012","journal-title":"Information security"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.11.012"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.156"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9020219"},{"issue":"2","key":"20","article-title":"Improved detection of dos attacks using intelligent computation techniques","volume":"3","author":"J. Visumathi","year":"2010","journal-title":"SRIMCA"},{"key":"21","doi-asserted-by":"crossref","article-title":"Intrusion detection model based on particle swarm optimization and support vector machine","author":"S. Srinoy","DOI":"10.1109\/CISDA.2007.368152"},{"issue":"35","key":"22","doi-asserted-by":"crossref","DOI":"10.17485\/ijst\/2015\/v8i35\/86652","article-title":"Hybrid evolutionary algorithm based intrusion detection system for denial of service attacks","volume":"8","author":"S. Mourougan","year":"2016","journal-title":"Indian Journal of Science and Technology"},{"key":"23","first-page":"1","volume-title":"Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm","author":"U. Akyaz\u0131","year":"2010"},{"issue":"12","key":"24","first-page":"31999","article-title":"Layered approach for intrusion detection using multiobjective particle swarm optimization","volume":"10","author":"B. Ben Sujitha","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.12.2350-2360"},{"key":"26","first-page":"559","article-title":"Analysis on intrusions detection based on support vector machine optimized with swarm intelligence","volume":"3","author":"P. Shinde","year":"2015","journal-title":"International Journal of Computer Science and Mobile Computing IJCSMC"},{"key":"27","article-title":"BARTD: Bio-inspired anomaly-based real-time detection of under rated App-DDoS attack on web","volume":"32","author":"K. Munivara Prasad","year":"2017","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"28","article-title":"Metaheuristic algorithms based flow AnomalyDetector","author":"Z. Jadidi"},{"key":"29","first-page":"15","article-title":"Hybrid Network Intrusion Detection for DoS Attacks","volume":"9","author":"K. P. Mohan Kumar","year":"2016","journal-title":"IJCTA"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.4.14"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.004"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.08.009"},{"key":"33","article-title":"Naive bayesian networks in intrusion detection systems","author":"N. Ben Amor"},{"key":"34","first-page":"231","article-title":"A new intrusion detection approach using PSO based multiple criteria linear programming","volume":"55","author":"S. M. H. Bamakan","year":"2015","journal-title":"Information Technology and Quantitative Management"},{"issue":"2","key":"35","article-title":"A hybrid intrusion detection system using particle swarm optimization for feature selection","volume":"3","author":"S. Khajouei Nejad","year":"2015","journal-title":"International Journal of Soft Computing and Artificial Intelligence"},{"key":"36","article-title":"Detecting DDoS attack based on PSO Clustering algorithm","author":"X. Hao"},{"key":"37","article-title":"Using particle swarm optimization (PSO) algorithm to protect vehicular Ad Hoc networks (VANETS) from denial of service (DOS) attack","volume":"5","author":"S. Momanyi Nyabuga","year":"2016","journal-title":"IJARCET"},{"key":"38","article-title":"Traffic prediction and approach based on PSO optimized Elman neural network","author":"W. Guoli"},{"key":"39","article-title":"An efficient method for denial of service attack detection using genetic algorithm","volume":"4","author":"L. K. Siva Sankari","year":"2015","journal-title":"IJARSE"},{"key":"40","doi-asserted-by":"crossref","article-title":"Distributed denial of services attack protection system with genetic algorithms on hadoop cluster computing framework","author":"M. Mizukoshi","DOI":"10.1109\/CEC.2015.7257075"},{"key":"41","article-title":"Ddos attacks detection using GA based optimized traffic matrix","author":"J. H. Lee"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt031"},{"key":"43","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24674-9_29","article-title":"Feature selection for robust detection of distributed denial-of-Service attacks using genetic algorithms","volume-title":"SETN, Lecture Notes in Computer Science","author":"G. Dimitris","year":"2004"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.08.020"},{"key":"45","article-title":"Application of artificial bee colony for intrusion detection systems","volume":"8","author":"M. Aldwairi","year":"2012","journal-title":"Security and Communication Networks"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.5120\/17188-7369"},{"issue":"6","key":"47","article-title":"Cuckoo filter & Remote firewall: a mechanism for mitigation of distributed denial of service attacks","volume":"3","author":"V. V. Mahale","year":"2016","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"issue":"3","key":"48","first-page":"2263","article-title":"Prevention of DDOS attacks using new cracking algorithm","volume":"2","author":"V. Priyadharshini","year":"2012","journal-title":"Engineering Research and Applications (IJERA)"},{"key":"49","article-title":"Detecting DDoS attack based on PSO Clustering algorithm","author":"X. Hao"},{"issue":"11","key":"50","article-title":"Bacterial foraging optimization for fake website detection","volume":"1","author":"R. Damodaram","year":"2013","journal-title":"International Journal of Computer Science & Applications (TIJCSA)"},{"issue":"4","key":"51","article-title":"LDDoS attack detection by using ant colony optimization algorithms","volume":"32","author":"H. H. Chen","year":"2016","journal-title":"Journal of Information Science & Engineering"},{"issue":"6","key":"52","first-page":"469","article-title":"Ant colony optimization based approach for the detection of black Hole attack in WANET","volume":"4","author":"N. Kumar","year":"2015","journal-title":"IJCSMC"},{"issue":"1","key":"53","first-page":"184","article-title":"Dynamic ant colony system with three-level update feature selection for intrusion detection","volume":"20","author":"H. M. Rais","year":"2018","journal-title":"International Journal of Network Security"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2947542"},{"key":"55","volume-title":"An Efficient Flow-Based Multi-Level Hybrid Intrusion Detection System for Software-Defined Networks","author":"M. Latah","year":"2018"},{"key":"56","first-page":"115","article-title":"Improving software quality using machine learning","author":"K. Chandra"},{"key":"57","article-title":"Anomaly detection in automated vehicles using multistage attention-based convolutional neural network","author":"A. R Javed"},{"key":"58","article-title":"Analysis of security and energy efficiency for shortest route discovery in low\u2010energy adaptive clustering hierarchy protocol using Levenberg\u2010Marquardt neural network and gated recurrent unit for intrusion detection system","author":"M. Mittal","year":"2020","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"2","key":"59","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","article-title":"Extreme learning machines: a survey","volume":"2","author":"H. Guang-Bin","year":"2011","journal-title":"International Journal of Machine Learning and Cybernetics"},{"issue":"2","key":"60","article-title":"Comparative study of preventive algorithms of Ddos attack","volume":"7","author":"D. Chavan","year":"2016","journal-title":"International Journal of Scientific & Engineering Research"},{"issue":"12","key":"61","article-title":"network intrusion detection using na\u00efve bayes","volume":"7","author":"M. Panda","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2003.1223922"},{"key":"63","doi-asserted-by":"crossref","article-title":"Flow-based anomaly detection using neural network optimized with GSA algorithm","author":"Z. Jadidi","DOI":"10.1109\/ICDCSW.2013.40"},{"key":"64","first-page":"943","article-title":"Intrusion detection with neural networks","author":"J. Ryan","year":"1998","journal-title":"Advances in Neural Information Processing Systems"},{"key":"65","first-page":"443","article-title":"Artificial neural networks for misuse detection","author":"J. Cannady"},{"issue":"1","key":"66","first-page":"no. 13","article-title":"K-means clustering and naive bayes classification for intrusion detection","volume":"4","author":"Z. Muda","year":"2014","journal-title":"Journal of Information Technology and Applications"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.5120\/2932-3883"},{"key":"68","article-title":"Intrusion detection: support vector machines and neural networks","volume":"2","author":"S. Mukkamala","year":"2002","journal-title":"IJCNN"},{"key":"69","article-title":"Using Rough set and support vector machine for network intrusion detection system","author":"R.-C. Chen"},{"key":"70","article-title":"A novel Intrusion detection method based on improved SVM by Combaining PCA and PSO","volume":"16","author":"H. wang","year":"2011","journal-title":"Wuhan University Journal of Natural Science"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.6.22"},{"key":"72","article-title":"\u201cKien A hua\u201d Decision tree classifier for network intrusion detection with GA based feature selection","author":"G. stein"},{"key":"73","article-title":"Network intrusion detection using feature selection and decision tree classifier","author":"R. Karthik"},{"key":"74","first-page":"2473","article-title":"A hybrid technique using multi-objective particle swarm optimization and random forests for PROBE attacks detection in a network","author":"A. J. Malik"},{"key":"75","article-title":"Binary PSO and Random Forests Algorithm for PROBE Attacks Detection in a Network","author":"A. J. Malik"},{"key":"76","doi-asserted-by":"crossref","article-title":"Combination artificial ant clustering and K-PSO clustering approach to network security model","author":"S. Srinoy","DOI":"10.1109\/ICHIT.2006.253601"},{"key":"77","doi-asserted-by":"crossref","article-title":"Optimizing Fuzzy K-means for network anomaly detection using PSO","author":"R. Ensafi","DOI":"10.1109\/AICCSA.2008.4493603"},{"key":"78","doi-asserted-by":"crossref","article-title":"Investigating hidden Markov models capabilities in anomaly detection","author":"S. S. Joshi","DOI":"10.1145\/1167350.1167387"},{"key":"79","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"C. Yin","year":"2017","journal-title":"IEEE Access"},{"key":"80","article-title":"CANintelliIDS: Detecting In-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU","author":"A. Rehman"},{"key":"81","doi-asserted-by":"crossref","article-title":"A deep learning Approach for network intrusion detection system","author":"A. Javaid","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"83","doi-asserted-by":"crossref","article-title":"Intrusion detection based on neural networks and artificial bee colony algorithm","author":"Q. Qian","DOI":"10.1109\/ICIS.2014.6912144"},{"key":"84","first-page":"1392","article-title":"Network intrusion detection based on novel feature selection model and various recurrent neural networks","volume":"9","author":"L. Thi-Thu-Huong","year":"2020","journal-title":"Applied Science"},{"key":"85","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2895334"},{"key":"86","doi-asserted-by":"crossref","DOI":"10.1016\/j.procs.2015.03.174","article-title":"Feature selection based hybrid anomaly intrusion detection system using K means and RBF Kernel function","volume":"45","author":"U. Ravale","year":"2015","journal-title":"Procedia Computer Science"},{"key":"87","first-page":"33","article-title":"Challenges of using machine learning algorithms for cybersecurity: a study of threat classification models applied to social media communication data, Cyber Influence and Cognitive Threats","volume":"2020","author":"A. Q. Lima","year":"2019","journal-title":"Cyber influence and Cognitive Threats"},{"key":"88","article-title":"Research on intrusion detection system based on improved PSO-SVM algorithm","volume":"51","author":"B. Tan","year":"2016","journal-title":"Chemical Engineering Transactions"},{"key":"89","doi-asserted-by":"crossref","article-title":"Fuzzy knowledge discovery and decision-making through clustering and Dynamic tables: application in Colombian business Finance","author":"Y. F. Hernandez-Julio","DOI":"10.23919\/CISTI49556.2020.9141117"},{"issue":"1867","key":"90","article-title":"B corps: a socioeconomic approach for the COVID-19 post-crisis","volume":"11","author":"J. M. Saiz-\u00c1lvarez","year":"2020","journal-title":"Frontiers in Psychology"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3210207"},{"issue":"1","key":"92","doi-asserted-by":"crossref","first-page":"97","DOI":"10.3390\/electronics9010097","article-title":"Applications in security and evasions in machine learning: A survey","volume":"9","author":"S. Ramani","year":"2020","journal-title":"Electronics"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5561816.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5561816.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5561816.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T00:50:34Z","timestamp":1623718234000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5561816\/"}},"subtitle":[],"editor":[{"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,6,14]]},"references-count":92,"alternative-id":["5561816","5561816"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5561816","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,6,14]]}}}