Научная статья на тему 'AN ENHANCED EXPLORATION AND EXPLOITATION OF MODIFIED GREY WOLF OPTIMIZER FOR FUZZY RULES REDUCTION IN CLOUD INTRUSION DETECTION SYSTEM (CIDS)'

AN ENHANCED EXPLORATION AND EXPLOITATION OF MODIFIED GREY WOLF OPTIMIZER FOR FUZZY RULES REDUCTION IN CLOUD INTRUSION DETECTION SYSTEM (CIDS) Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
60
30
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
GREY WOLF OPTIMIZER / CIDS / MODIFIED GREY WOLF OPTIMIZER / EXPLOITATION AND INTRUSION DETECTION SYSTEM

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Chidambaram B., Erode Subramaniam S., Varatharaj A.

Optimization problems in the Cloud Intrusion Detection System (CIDS) contain numerous conflicting objectives, uni- modal and multi-modal functions and the difficulty level varying between linear to non-linear limits. The Grey Wolf Optimizer (GWO) is a meta-heuristic technique that is implemented based on social behavior of wolves and their hunting behavior. Significant improvement in exploration and exploitation of the search space in GWO can be obtained by modifying the control parameter a. Works have already been carried out by many researchers by modifying the control parameter a in different manner to achieve better results. In a similar content, the authors of this study also modified the control parameter a and added a weight factor to the position of each wolf to attain the best possible results. Due to high demand for the cloud computing environment, intrusion detection in a cloud network plays a big role in maintaining the faith of the clients. Hence, CIDS is required to inspect the network packets to identify the abnormal behavior. For developing a system for cloud based IDS, the researchers created fuzzy rules to represent the relationship between the attributes and the nature of activity (normal or abnormal). The Modified Grey Wolf Optimizer (MGWO) algorithm is applied on eleven benchmark test functions and obtained good performance metrics. The results presented in this paper are promising; MGWO is used to reduce the fuzzy rules in developing fuzzy based CIDS. The performance of the proposed algorithm is compared with classical GWO, Particle Swarm Optimization (PSO), Cuckoo Search (CS) and variant of MGWO. The experimental results reveal that there is significant improvement in its performance.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «AN ENHANCED EXPLORATION AND EXPLOITATION OF MODIFIED GREY WOLF OPTIMIZER FOR FUZZY RULES REDUCTION IN CLOUD INTRUSION DETECTION SYSTEM (CIDS)»

УНИВЕРСИТЕТ итмо

НАУЧНО-ТЕХНИЧЕСКИИ ВЕСТНИК ИНФОРМАЦИОННЫХ ТЕХНОЛОГИИ, МЕХАНИКИ И ОПТИКИ ноябрь-декабрь 2021 Том 21 № 6 http://ntv.ifmo.ru/

SCIENTIFIC AND TECHNICAL JOURNAL OF INFORMATION TECHNOLOGIES, MECHANICS AND OPTICS November-December 2021 Vol. 21 No 6 http://ntv.ifmo.ru/en/

ISSN 2226-1494 (print) ISSN 2500-0373 (online)

ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙ. МЕХАНИКИ И йПТИКИ

doi: 10.17586/2226-1494-2021-21-6-912-918

An Enhanced Exploration and Exploitation of Modified Grey Wolf Optimizer for Fuzzy Rules Reduction in Cloud Intrusion Detection System (CIDS) Bagyalakshmi Chidambaram Samundeeswari Erode Subramaniam 2, Arunkumar Varatharaj 3

Vellalar college for Women, Erode, 638012, India 3 Kongu Engineering College, Erode, 638052, India

1 bagyachithra@gmail.comH, https://orcid.org/0000-0001-6630-3678

2 essamundeeswari@gmail.com, https://orcid.org/0000-0002-1783-2634

3 arun15aug2002@gmail.com, https://orcid.org/0000-0002-1399-9437

Abstract

Optimization problems in the Cloud Intrusion Detection System (CIDS) contain numerous conflicting objectives, unimodal and multi-modal functions and the difficulty level varying between linear to non-linear limits. The Grey Wolf Optimizer (GWO) is a meta-heuristic technique that is implemented based on social behavior of wolves and their hunting behavior. Significant improvement in exploration and exploitation of the search space in GWO can be obtained by modifying the control parameter a. Works have already been carried out by many researchers by modifying the control parameter a in different manner to achieve better results. In a similar content, the authors of this study also modified the control parameter a and added a weight factor to the position of each wolf to attain the best possible results. Due to high demand for the cloud computing environment, intrusion detection in a cloud network plays a big role in maintaining the faith of the clients. Hence, CIDS is required to inspect the network packets to identify the abnormal behavior. For developing a system for cloud based IDS, the researchers created fuzzy rules to represent the relationship between the attributes and the nature of activity (normal or abnormal). The Modified Grey Wolf Optimizer (MGWO) algorithm is applied on eleven benchmark test functions and obtained good performance metrics. The results presented in this paper are promising; MGWO is used to reduce the fuzzy rules in developing fuzzy based CIDS. The performance of the proposed algorithm is compared with classical GWO, Particle Swarm Optimization (PSO), Cuckoo Search (CS) and variant of MGWO. The experimental results reveal that there is significant improvement in its performance. Keywords

Grey Wolf Optimizer, CIDS, Modified Grey Wolf Optimizer, MGWO, Exploitation and Intrusion Detection System For citation: Chidambaram B., Erode Subramaniam S., Varatharaj A. An Enhanced Exploration and Exploitation of Modified Grey Wolf Optimizer for Fuzzy Rules Reduction in Cloud Intrusion Detection System (CIDS). Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2021, vol. 21, no. 6, pp. 912-918. doi: 10.17586/2226-1494-2021-21-6-912-918

УДК 004.056.53

Исследование модифицированного алгоритма оптимизации серых волков

для редукции нечетких правил в облачной системе обнаружения вторжений

Чидамбарам Багьялакшми1Н, Эроде Субраманиам Самундесвари2, Варатхарадж Арункумар3

!>2 Веллаларский женский колледж, Эроде, 638012, Индия 3 Инженерный колледж Коргу, Эроде, 638052, Индия

1 bagyachithra@gmailxomи, https://orcid.org/0000-0001-6630-3678

2 essamundeeswari@gmail.com, https://orcid.org/0000-0002-1783-2634

3 arun15aug2002@gmail.com, https://orcid.org/0000-0002-1399-9437

Аннотация

Проблема оптимизация в облачной системе обнаружения вторжений (CIDS) имеет множество противоречивых целей: наличие одномодальных и мультимодальных функций; уровень сложности задач варьируется от линейных

© Chidambaram В., Erode Subramaniam S., Varatharaj A., 2021

до нелинейных. В данной работе авторы предложили, спроектировали и разработали CIDS на основе алгоритма оптимизации серых волков (Grey Wolf Optimizer, GWO) в качестве метаэвристического метода, который способен обнаруживать атаки в нескольких доступных средах. При разработке системы обнаружения вторжений на основе облака созданы нечеткие правила представления взаимосвязи между атрибутами и характером активности (нормальным или ненормальным). Предложенный алгоритм применен к одиннадцати тестовым функциям, на которых показаны хорошие показатели производительности. Модифицированный алгоритм оптимизации серых волков может быть использован для сокращения нечетких правил при разработке нечетких CIDS. Выполнено сравнение производительности предложенного модернизированного алгоритма с классическим оптимизатором серых волков, алгоритмом роя частиц (PSO), алгоритмом поиска кукушки (CS). Результаты экспериментов показывают высокую производительность предложенного алгоритма. Ключевые слова

оптимизатор серого волка, GWO, модифицированный оптимизатор серого волка, MGWO, исследование и обнаружений вторжений

Ссылка для цитирования: Багьялакшми Ч., Самундесвари Э.С., Арункумар В. Исследование модифицированного алгоритма оптимизации серых волков для редукции нечетких правил в облачной системе обнаружения вторжений // Научно-технический вестник информационных технологий, механики и оптики. 2021. Т. 21, № 6. С. 912-918 (на англ. яз.). doi: 10.17586/2226-1494-2021-21-6-912-918

Introduction

The implementation ways of the modern Cloud Intrusion Detection Systems (CIDS) discover a list of challenges for intrusion detection. A suitable approach is required to resolve them; therefore new optimization techniques are developed for this purpose. Some of the well-known optimization techniques such as Simulated Annealing, Genetic Algorithm, Ant Colony Optimization, Particle Swarm Optimization, Cuckoo Search, Firefly Algorithm, and Bee Algorithm are utilized in different fields of research. The advantages of these optimization approaches are simple, flexible and capability in keeping away from reaching nearby optimal value.

The Grey Wolf Optimizer (GWO) is one of the modern population-based optimization approaches [1]. The social behavior and pursuing behavior of grey wolves has been modeled mathematically with the aid of an algorithm. Wolves are classified as Alpha (a), Beta (P), Delta (5) and Omega (ra) based on their roles. A wolf explores the prey and exploits itwith the help of another wolf's information. These exploration and exploitation are obtained through the control parameter a that improves the smooth transition between a wolf and its prey [2].

The emphasis is put on increasing the efficiency of the actual GWO by fine tuning of the control parameter a and on constructing the position-updated equation based on the weight factor to each wolf. This MGWO method is tested on benchmark functions and applied to optimize the fuzzy rules in CIDS. The fuzzy rules created in CIDS may be redundant; hence they should be reduced for designing an optimized fuzzy-based CIDS.

Brief Review of the Grey Wolf Optimizer Method

The GWO simulates the administrative behavior and searching manner of grey wolves, which are categorized into four important clusters such as a, P, 5, and ra wolves. Fig. 1 shows the hierarchy of the grey wolves.

In the top of hierarchy is a wolf, which leads the team as a head. The head of the wolf instructs other wolves to identify the sleeping place, hunting area, waking time and so on. The next hierarchy is occupied by P wolf, an ancillary wolf that helps with the decision-making of a

wolves and other cluster activities. In the third level of hierarchy is 5 wolf which offers the prey information to a and p wolves and also manages the œ wolves. The lower hierarchy is occupied by œ wolf which follows the commands of wolves in higher order a, p and 5 that are considered as the best, second and third search agents and represent the best solutions. The œ wolves are the remaining candidate solutions.

The grey wolves have significant searching mechanisms for targeting the prey. The searching mechanism that includes searching, pursuing, encircling and attacking the prey is represented in Fig. 2.

— Searching: The group of grey wolves try to identify the prey. After identifying, the prey is fixed as a target.

— Pursuing: Once the grey wolves fix the target, then prey is followed for attack.

— Encircling: The targeted prey is rounded off from all directions so that the prey could not escape from the wolves.

— Attacking: The prey is attacked by wolves.

Fig. 1. Hierarchy of grey wolves — from top to bottom

Fig. 2. Searching mechanism of grey wolves

Encircling Prey

Grey wolves (a, p and 5) hunt their prey by encircling them, which is considered to be sensible behavior. The mathematical model representing the principle of predation behavior is given below:

D = |C x - X|,

Vi) = XP - AxD.

(1) (2)

Where t is current iteration, A and C are coefficient vectors, Xp is position of the prey and X is Position of grey wolf. The distance between grey wolves and the prey is represented by the notation D and is written mathematically in equation (1) and (2).

The GWO algorithm starts by means of producing a set of random selections such as the preliminary population. The preliminary population of each grey wolves' positions are considered as random values, and their fitness values are calculated [3]. The fitness function also known as evaluation function, evaluates how close a given solution is to the optimum solution of the desired problem and determines how fit a solution is.

A = 2 x a x r1 - a C = 2 x r2

a = 2 x (i - —).

T

(3)

(4)

(5)

The coefficient vectors of A and C have an effect on the motion path of a grey wolf and control parameter a is a search space of a grey wolves. These coefficient vectors and control parameter are calculated by using the equations from (3) to (5).

Where a is linearly reduced from 2 to 0 and r1 and r2 are random vectors e [0, 1]. T is the maximum number of iterations and t is the current iteration.

Hunting

The searching mechanism is developed to simulate the grey wolves mathematically so that the wolves have a higher understanding of the knowledge about neighborhood prey. The best three wolves are sorted based on the fitness value. These three wolves are called best, second best, and third best. The selected wolves are called a (best candidate solution), p and 5. Now a, p and 5 are turned into search agents in GWO and these different search agents are often get updated on their positions.

Da = |Ci x Xa - X| (6)

Dß = IC2 x Xp - X| (7)

DS = IC3 x Xs - X| (8)

X1 = Xa " - A1 x Da (9)

X2 = Xß * - A2 x Dp (10)

X3 = Xs - - A3 x Dg. (11)

Where Wolves Distance — Da, Dp and Ds, Wolves Position — Xa, Xp and X s, Coefficient Vectors — Cj, C2, C3 and Aj, A2, A3. The updated positions are

calculated from equation (6) to equation (11).

Xj ~t~ X2 X3

X

(i+i) -

(12)

The position of the grey wolves is updated from equation (12). The role of each last wolf is calculated primarily based on the approximated role of the prey. The wolf a acts as a final solution in GWO.

Background Studies

Exploration and exploitation are considered as key terms for modifying optimization algorithms. Algorithms are tuned by control parameters to achieve success in their performance. In classical GWO, exploration and exploitation are divided into two halves, but it could not balance between these two divisions. Detailed literature studies were conducted and significant remarks are tabulated in Table 1.

The motivation of the proposed MGWO is based on the literature which evaluates a significant modification over the control parameter a. The control parameter a is modified to obtain smooth search space between exploration and exploitation.

Modified Grey Wolf Optimizer

This section elaborates the algorithm to explore the search process, namely the grey wolves search, based on the position of a, p and 5 wolves. The wolves move away from each other to search for the prey and come together to attack the prey. GWO algorithm allows search agents to update their position based on the location of a, p, 5 after each iteration and attack towards the prey. Two basic parameters are required to be initialized, the first parameter is the maximum number of search agents or wolfs [1]. The second important parameter is the number of iterations fixed depending upon the type of application.

The changeover between exploration and exploitation is made by the adaptive value of the control parameter a. Too much exploration of search space may result in lower probability of getting trapped in local optima [4, 5]. At the same time higher exploration introduces more randomness and the optimal solution may not be obtained [6]. At the same time, excess exploitation is related to less randomness and the algorithm may not reach the global optima.

In the proposed MGWO algorithm, the greater number of iterations are allotted to the exploration phase and the smaller number of iterations are allotted to the exploitation stage.

a = 2 x (1 - ^

(13)

The value of a decreased from 2 to 0 by the equation (13). There are a number of possibilities to improve the exploration rate. In this current work, various roots like square root (V), cube root (V) and fourth root (V) are applied on the decay function and found that square root (V) yields

better results than other roots. Cubic root (V) and fourth

4/

root (V) provide an inadequate searching space between the prey and wolves.

In the original GWO algorithm, the position vector of a grey wolf is equally guided by the positions of a, p and 5 wolves as given by equation (12) [7]. As the most dominating member among the group is a followed by p

Table 1. Significant remarks of existing MGWO methods

Author Modified control parameter (a) Remarks

Nitin Mittal et.al., (2016) [11] ? a = 2 x (1 - -) T2 Decay function for exponential terms is used iterations for a. The iteration is divided into 70 % for exploration and 30 % for exploitation in the search space.

Sasmita Padhy et.al., (2017) [8] f-5 a = 2 x (1 - The decay function is used to reduce a enhances the rate of exploration. The smooth course of the iteration process is divided into 75 % for exploration and 25 % for exploitation. Avoidance of unnecessary holding towards the local optima, which can cause randomness in exploitation, increases search space.

Fu Yan et.al., (2019) [6] t л ft~ a = 2 - 4 x exp(—) x cos(—)x — T 2 yT A continuous nonlinearity is observed in this trial. This nonlinearity gets increased along with the increasing iterations. An equal balance between exploration and exploitation is achieved in this algorithm.

Jia Cai et.al., (2020) [9] ai = 2 x (1 - p и a2 = a1 x (1 - sin(-) x t) il x T x = T-t T a = X x a1 + (1 - X) x a2 Global search space is used at the time of initializing the algorithm. In the final stage, a local search method is used. Mathematical modeling of the GWO method to reach the prey is obtained by reducing the value of a. The rate of iteration used in GWO to explore and exploit is 74 % and 26 % respectively.

Ramin Ahmadi et.al., (2020) [4] a = 2 - 2 x (-)k T The parameter a modified linearly which in turn makes certain changes over the exploration and exploitation phenomena. The k variable is maintained as a constant value between 0 and 1, change in the power of exploration and exploitation is done to reach the balance between them using k values. The iteration for exploration is 79 % and exploitation is 21 % in this experiment.

and 5, in the proposed modified GWO, more weightage is given to a followed by p and 5 to find the position vector of a grey wolf [8]. The weight factor is denoted by W that holds different factor for each wolf like W1, W2 and W3.

(14)

w = wn_i + w+i.

X,

(W1xX1) + (W2xX2) + (W3xX3)

(t+1) ■

(15)

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

End for

Update a by equation (13) Update A and C by equation (3) and equation (4) Calculate the fitness of all search agents Update Xa t = t + 1 End while Return Xa

, Xp and X5

Two random numbers are set as initial values and each weight is the sum of the two preceding weights calculated from equation (14). These weights in each wolf positions could multiply from equation (15). Where n = 1, 2, 3 and t is the current iteration. Each wolf positions are updated in GWO search agents by adding weight factors, this helps to improve the next level of hunting.

Algorithm 1: pseudocode of MGWO

Initialize the search agent (grey wolf) population Xj (j = 1

to n number of natural numbers)

Initialize Control Parameters a, A and C

Calculate the fitness value — each search agent

Xa — best (or dominating) search agent

Xp — second best search agent

X5 — third best search agent

While (t < T)

For each search agent

Update the position of the current search agent by equation (15)

Experimental Results for Benchmark Functions

In this section, the proposed MGWO is implemented in R. MGWO is executed with following parameter settings as shown in Table 2. The input of data size may be either row wise or column wise data [9].

The performance of MGWO is applied on benchmark test functions, which is shown in Table 3 and statistical results are shown in Table 4. The proposed MGWO method is performed effectively on benchmark test functions [10], hence this method is implemented for fuzzy rules reduction in CIDS.

Fuzzy Rules Reduction using MGWO

An Intrusion Detection System (IDS) is a device or software application that monitors a network activity and reports to an administrator [11]. The utilization of cloud servers is increasing day by day. The increase in the workload of cloud servers leads to lack of network control,

Table 2. MGWO Parameter settings

Parameter settings Value

numVar (the number of variables are determined with positive integer) 50

(it is called as data size)

numPopulation 20

maxIter 100

Table 3. Benchmark test functions

Label Test function Nature Dimension Range

F1 Step Uni-Modal 30 [-1.28, 1.28]

F2 Rosenbrock Uni-Modal 30 [-30, 30]

F3 Schwefel Uni-Modal 30 [-10, 10]

F4 Sphere Uni-Modal 30 [-100, 100]

F5 Schaffer Uni-Modal 30 [-100, 100]

F6 Ackley Multi-Modal 30 [-32, 32]

F7 Alpine Multi-Modal 30 [-50.0, 50.0]

F8 Griewank Multi-Modal 30 [-600, 600]

F9 Trid Multi-Modal 30 [-100, 100]

F10 Rastrigin Multi-Modal 30 [-5.12, 5.12]

F11 Salomon Multi-Modal 30 [-100, 100]

Table 4. Statistical results for MGWO

Label Test function MGWO GWO PSO CS

Mean STD Mean STD Mean STD Mean STD

F1 Step 0.012 0.014 0.005 0.005 0.113 0.096 3.939 2.575

F2 Rosenbrock 0.040 0.134 0.012 0.026 0.437 0.318 3.990 2.158

F3 Schwefel 4.906 0.968 4.341 1.710 5.679 1.418 5.214 2.446

F4 Sphere 0.016 0.029 0.007 0.007 0.216 0.164 4.007 2.888

F5 Schaffer 2.349 3.210 2.989 3.007 2.301 2.383 4.077 2.404

F6 Ackley 0.002 0.001 0.016 0.029 0.410 0.444 4.140 2.810

F7 Alpine 0.001 0.001 0.003 0.003 1.411 1.549 3.540 3.026

F8 Griewank 0.175 0.178 0.037 0.053 0.226 0.233 3.399 2.281

F9 Trid 4.702 3.761 3.021 3.188 9.773 0.966 3.631 2.459

F10 Rastrigin 0.478 0.698 0.196 0.350 1.507 0.951 4.165 2.753

F11 Salomon 0.267 0.313 0.772 0.660 0.526 0.410 4.794 2.590

resulting in increased attacks on servers. Hence there is a need for cloud-based IDS to detect intrusions on servers.

Many benchmark datasets are available for cloud-based IDS problems and used by many researchers for their IDS based studies [12]. The NSL-KDD, one of the benchmark dataset, has 42 features and 2,26,283 records in four categories of attacks (DoS, R2L (Remote to user), U2R (user to root) and Probing). The records are characterized as normal and abnormal data, each abnormal record is classified into one of the four kinds of attacks. In the previous paper [13], the CIDS model to Distributed Denial of Service (DDoS) attack using NSL-KDD was discussed. Feature selection methods (LVQ and PCA) and classification models (NB, DT and SVM) were used to classify the normal and abnormal records.

Table 5. The Performance of MGWO in fuzzy rules Reduction

Implementation methods fuzzy rules in numbers

Nitin Mittal et.al., (2016) [11] 86

Sasmita Padhy et.al., (2017) [8] 85

Fu Yan et.al., (2019) [6] 77

Jia Cai et.al., (2020) [9] 73

Ramin Ahmadi et.al., (2020) [4] 70

PSO 86

Cuckoo Search (CS) 87

GWO 80

Proposed MGWO 66

Fig. 3. Reduction of fuzzy rules using MGWO

The fuzzy logic technique of Mamdani model is applied on the pre-processed NSL-KDD dataset to derive the relationship between effective fields involved in CIDS [14]. In this model, the authors defined 3 member variables (high, low and medium) for 19 fields and created 167 rules, however some of them may be redundant. The reduction of fuzzy rules using MGWO architecture is shown in Fig. 3. The MGWO algorithm is applied to optimize the fuzzy rules to generate an effective set of rules, and the smaller number of rules gives better understanding of relationship between features and attacks [15]. The comparative results of fuzzy rules reduction is shown in Table 5. The proposed algorithm reduces the number of rules effectively and the

results are compared with GWO, PSO, CS and variants of MGWO algorithms.

Conclusion

The decay function used to modify the control parameter a enhances exploration and modification of weights leads to better exploitation. This work effectively improves both exploration and exploitation of search spaces. The MGWO was tested using 11 benchmark test functions and compared with GWO, PSO and CS. The results of applying MGWO showed better performance compared to other algorithms. It is used for optimizing the fuzzy rules in CIDS.

References

1. Mirjalili S., Mirjalili S.M., Lewis A. Grey wolf optimizer. Advances in Engineering Software, 2014, vol. 69, pp. 46-61. https://doi. org/10.1016/j.advengsoft.2013.12.007

2. Seema, Kumar V. Modified grey wolf algorithm for optimization problems. Proc. of the International Conference on Inventive Computation Technologies (ICICT2016), 2016, pp. 7830162. https:// doi.org/10.1109/INVENTIVE.2016.7830162

3. Li J., Fong S., Wong R.K., Millham R., Wong K.K.L. Elitist binary wolf search algorithm for heuristic feature selection in high-dimensional bioinformatics datasets. Scientific Reports, 2017, vol. 7, pp. 4354. https://doi.org/10.1038/s41598-017-04037-5

4. Ahmadi R., Ekbatanifard G., Bayat P. A Modified grey wolf optimizer based data clustering algorithm. Applied Artificial Intelligence, 2021, vol. 35, no. 1, pp. 63-79. https://doi.org/10.1080/08839514.2020.18 42109

5. Mohanraj T., Kumar M.D. The process parameter optimization for grey cast iron in turning process using response surface methodology. International Journal of Mechanical and Production Engineering Research and Development, 2019, vol. 9, pp. 997-1006.

6. Yan F., Xu J., Yun K. Dynamically dimensioned search grey wolf optimizer based on positional interaction information. Complexity, 2019, pp. 7189653. https://doi.org/10.1155/2019/7189653

7. Al-Tashi Q., Rais H., Jadid S. Feature selection method based on grey wolf optimization for coronary artery disease classification. Advances in Intelligent Systems and Computing, 2019, vol. 843, pp. 257-266. https://doi.org/10.1007/978-3-319-99007-1_25

8. Padhy S., Panda S., Mahapatra S. A modified GWO technique based cascade PI-PD controller for AGC of power systems in presence of plug in electric vehicles. Engineering Science and Technology, an International Journal, 2017, vol. 20, no. 2, pp. 427-442. https://doi. org/10.1016/j.jestch.2017.03.004

Литература

1. Mirjalili S., Mirjalili S.M., Lewis A. Grey wolf optimizer // Advances in Engineering Software. 2014. V. 69. P. 46-61. https://doi. org/10.1016/j.advengsoft.2013.12.007

2. Seema, Kumar V. Modified grey wolf algorithm for optimization problems // Proc. of the International Conference on Inventive Computation Technologies (ICICT 2016). 2016. P. 7830162. https:// doi.org/10.1109/INVENTIVE.2016.7830162

3. Li J., Fong S., Wong R.K., Millham R., Wong K.K.L. Elitist binary wolf search algorithm for heuristic feature selection in high-dimensional bioinformatics datasets // Scientific Reports. 2017. V. 7. P. 4354. https://doi.org/10.1038/s41598-017-04037-5

4. Ahmadi R., Ekbatanifard G., Bayat P. A Modified grey wolf optimizer based data clustering algorithm // Applied Artificial Intelligence. 2021. V. 35. N 1. P. 63-79. https://doi.org/10.1080/08839514.2020.! 842109

5. Mohanraj T., Kumar M.D. The process parameter optimization for grey cast iron in turning process using response surface methodology // International Journal of Mechanical and Production Engineering Research and Development. 2019. V. 9. P. 997-1006.

6. Yan F., Xu J., Yun K. Dynamically dimensioned search grey wolf optimizer based on positional interaction information // Complexity. 2019. P. 7189653. https://doi.org/10.1155/2019/7189653

7. Al-Tashi Q., Rais H., Jadid S. Feature selection method based on grey wolf optimization for coronary artery disease classification // Advances in Intelligent Systems and Computing. 2019. V. 843. P. 257-266. https://doi.org/10.1007/978-3-319-99007-1_25

8. Padhy S., Panda S., Mahapatra S. A modified GWO technique based cascade PI-PD controller for AGC of power systems in presence of plug in electric vehicles // Engineering Science and Technology, an International Journal. 2017. V. 20. N 2. P. 427-442. https://doi. org/10.1016/j.jestch.2017.03.004

9. Cai J., Xu G., Ye W. Modified grey wolf optimizer based maximum entropy clustering algorithm. Proc. of the International Joint Conference on Neural Networks (IJCNN 2020), 2020, pp. 9207253. https://doi.org/10.1109/IJCNN48605.2020.9207253

10. Mittal N., Singh U., Sohi B.S. Modified grey wolf optimizer for global engineering optimization. Applied Computational Intelligence and Soft Computing, 2016, vol. 2016, pp. 7950348. https://doi. org/10.1155/2016/7950348

11. Mittal N., Singh U., Sohi B.S. Modified grey wolf optimizer for global engineering optimization. Applied Computational Intelligence and Soft Computing, 2016, vol. 2016, pp. 7950348. https://doi. org/10.1155/2016/7950348

12. Singh N., Singh S.B. A modified mean gray wolf optimization approach for benchmark and biomedical problems. Evolutionary Bioinformatics, 2017, vol. 13. https://doi.org/10.1177/1176934317729413

13. Bagyalakshmi C., Samundeeswari E.S. DDoS attack classification on cloud environment using machine learning techniques with different feature selection methods. International Journal of Advanced Trends in Computer Science and Engineering, 2020, vol. 9, no. 5, pp. 73017308. https://doi.org/10.30534/ijatcse/2020/60952020

14. Li L., Sun L., Guo J., Qi J., Xu B., Li S. Modified discrete grey wolf optimizer algorithm for multilevel image thresholding. Computational Intelligence and Neuroscience, 2017, pp. 3295769. https://doi. org/10.1155/2017/3295769

15. Thangamuthu M.O., Yerchuru J.A., Shanmugam N.A., Ravi Y., Gur A. Multi-response optimization of end-milling parameters for inconel 625 using taguchi coupled with topsis. Surface Review and Letters, 2021, vol. 28, no. 10, pp. 2150096. https://doi.org/10.1142/ S0218625X21500967

Authors

Bagyalakshmi Chidambaram — M.Phil., Research Scholar, Vellalar college for Women, Erode, 638012, India, 57219419148, https://orcid. org/0000-0001-6630-3678, bagyachithra@gmail.com

Samundeeswari Erode Subramaniam — PhD, Associate Professor, Vellalar college for Women, Erode, 638012, India, gg 56153581400, https://orcid.org/0000-0002-1783-2634, essamundeeswari@gmail.com Arunkumar Varatharaj — PhD, Assistant Professor, Kongu Engineering College, Erode, 638052, India, gg 15922361400, https://orcid.org/0000-0002-1399-9437, arun15aug2002@gmail.com

Received 07.09.2021

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Approved after reviewing 25.10.2021

Accepted 30.11.2021

9. Cai J., Xu G., Ye W. Modified grey wolf optimizer based maximum entropy clustering algorithm // Proc. of the International Joint Conference on Neural Networks (IJCNN 2020). 2020. P. 9207253. https://doi.org/10.1109/IJCNN48605.2020.9207253

10. Mittal N., Singh U., Sohi B.S. Modified grey wolf optimizer for global engineering optimization // Applied Computational Intelligence and Soft Computing. 2016. V. 2016. P. 7950348. https://doi. org/10.1155/2016/7950348

11. Mittal N., Singh U., Sohi B.S. Modified grey wolf optimizer for global engineering optimization // Applied Computational Intelligence and Soft Computing. 2016. V. 2016. P. 7950348. https://doi. org/10.1155/2016/7950348

12. Singh N., Singh S.B. A modified mean gray wolf optimization approach for benchmark and biomedical problems // Evolutionary Bioinformatics. 2017. V. 13. https://doi.org/10.1177/1176934317729413

13. Bagyalakshmi C., Samundeeswari E.S. DDoS attack classification on cloud environment using machine learning techniques with different feature selection methods // International Journal of Advanced Trends in Computer Science and Engineering. 2020. V. 9. N 5. P. 7301-7308. https://doi.org/10.30534/ijatcse/2020/60952020

14. Li L., Sun L., Guo J., Qi J., Xu B., Li S. Modified discrete grey wolf optimizer algorithm for multilevel image thresholding // Computational Intelligence and Neuroscience. 2017. P. 3295769. https://doi.org/10.1155/2017/3295769

15. Thangamuthu M.O., Yerchuru J.A., Shanmugam N.A., Ravi Y., Gur A. Multi-response optimization of end-milling parameters for inconel 625 using taguchi coupled with topsis // Surface Review and Letters. 2021. V. 28. N 10. P. 2150096. https://doi.org/10.1142/ S0218625X21500967

Авторы

Багьялакшми Чидамбарам — магистр, исследователь, Веллаларский женский колледж, Эроде, 638012, Индия, ^Е 57219419148, https://orcid.org/0000-0001-6630-3678, bagyachithra@ gmail.com

Самундесвари Эроде Субраманиам — PhD, доцент, , Веллаларский женский колледж, Эроде, 638012, Индия, 56153581400, https://orcid. org/0000-0002-1783-2634, essamundeeswari@gmail.com Арункумар Варатхарадж — PhD, доцент, , Инженерный колледж Коргу, Эроде, 638052, Индия, ^ 15922361400, https://orcid.org/0000-0002-1399-9437, arun15aug2002@gmail.com

Статья поступила в редакцию 07.09.2021 Одобрена после рецензирования 25.10.2021 Принята к печати 30.11.2021

Работа доступна по лицензии Creative Commons «Attribution-NonCommercial»

i Надоели баннеры? Вы всегда можете отключить рекламу.