Metaheuristic Optimization Review

Journal DOI

https://doi.org/10.54216/MOR

Submit Your Paper

3066-280XISSN (Online)

Volume 4 , Issue 1 , PP: 41-49, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts

Shahid Mahmood 1 *

  • 1 School of Finance and Economics, Jiangsu University, Zhenjiang, People's Republic of China - (shahidnajam786@live.com)
  • Doi: https://doi.org/10.54216/MOR.040105

    Received: February 05, 2025 Revised: March 03, 2025 Accepted: May 09, 2025
    Abstract

    The increasing number of cyber security threats, notably ransomware and malware, make traditional methods ineffective, hence the need for intelligent methods. This literature review delves into the latest advancements in cyber security technologies that leverage artificial intelligence (AI), machine learning (ML), and deep learning (DL) to enhance system defenses. Key focus areas include improving ransomware detection, developing more effective intrusion detection systems (IDS), securing Internet of Things (IoT) networks, and strengthening cryptographic methods. The reviewed studies highlight how AI-driven techniques—such as convolutional neural networks (CNNs), long short-term memory (LSTM) networks, and adversarial training—automate the detection of threats, optimize cyber security measures, and offer real-time responses to evolving risks. Innovative frameworks like Zero Trust Architecture (ZTA) and AI further bolster security by offering automated threat mitigation and anomaly detection. Furthermore, new metaheuristic algorithms are integrated into IDS systems to enhance the detection rate and minimize false positives. The advanced approaches show how AI could solve the constantly emerging challenges in cyber security and focus on a continuous development approach to make cyber security scalable, robust, and transparent when considering complex attacks.

    Keywords :

    Cybersecurity , Artificial intelligence , Machine learning , Ransomware detection , Intrusion detection systems , Internet of Things , Cryptographic systems

    References

    [1]       R. Alkanhel, E.-S. El-Kenawy, A. Abdelhamid, A. Ibrahim, M. Alohali, et al., “Network intrusion detection based on feature selection and hybrid metaheuristic optimization,” Computers, Materials and Continua, vol. 74, pp. 2677–2693, 2022, doi: 10.32604/cmc.2023.033273.

    [2]      L. Saha, H. K. Tripathy, T. Gaber, H. El-Gohary, and E.-S. M. El-Kenawy, “Deep churn prediction method for telecommunication industry,” Sustainability, vol. 15, no. 5, Art. no. 5, 2023, doi: 10.3390/su15054543.

    [3]      A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,” Journal of Big Data, vol. 11, no. 1, p. 105, 2024.

    [4]      B. R. Maddireddy and B. R. Maddireddy, “Evolutionary algorithms in AI-driven cybersecurity solutions for adaptive threat mitigation,” International Journal of Advanced Engineering Technologies and Innovations, vol.1, no. 2, Art. no. 2, 2021.

    [5]      B. M. Ampel, S. Samtani, H. Zhu, H. Chen, and J. F. Nunamaker Jr., “Improving threatmitigation through a cybersecurity risk management framework: a computational design science approach,” Journal of Management Information Systems, vol. 41, no. 1, pp. 236–265, 2024, doi: 10.1080/07421222.2023.2301178.

    [6]      L. Gudala, M. Shaik, and S. Venkataramanan, “Leveraging machine learning for enhanced threat detection and response in zero trust security frameworks: an exploration of real-time anomaly identification and adaptive mitigation strategies,” 2021. Accessed: Oct. 11, 2024. [Online]. Available: https://thesciencebrigade.com/JAIR/article/view/222.

    [7]      E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Cybersecurity threats, countermeasures and mitigation techniques on the IoT: future research directions,” Electronics, vol. 11, no. 20, Art. no. 20, 2022, doi: 10.3390/electronics11203330.

    [8]      S. Al-Sarawi, M. Anbar, B. A. Alabsi, M. A. Aladaileh, and S. D. A. Rihan, “Passive rule-based approach to detect sinkhole attack in RPL-based Internet of Things networks,” IEEE Access, vol. 11, pp. 94081–94093, 2023.

    [9]      A. Alomiri, S. Mishra, and M. AlShehri, “Machine learning-based security mechanism to detect and prevent cyber-attack in IoT networks,” International Journal of Computing and Digital Systems, vol. 16, no. 1, pp. 645–659, 2024, doi: 10.12785/ijcds/160148.

    [10]   K. A. ElDahshan, A. A. AlHabshy, and B. I. Hameed, “Meta-heuristic optimization algorithm-based hierarchical intrusion detection system,” Computers, vol. 11, no. 12, Art. no. 12, 2022, doi: 10.3390/computers11120170.

    [11]   R. Ghanbarzadeh, A. Hosseinalipour, and A. Ghaffari, “A novel network intrusion detection method based on metaheuristic optimisation algorithms,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 6, pp. 7575–7592, 2023, doi: 10.1007/s12652-023-04571-3.

    [12]   A. Alzaqebah, I. Aljarah, O. Al-Kadi, and R. Damaševičius, “A modified grey wolf optimization algorithm for an intrusion detection system,” Mathematics, vol. 10, no. 6, Art. no. 6, 2022, doi: 10.3390/math10060999.

    [13]   N. Savanović, A. Toskovic, A. Petrovic, M. Zivkovic, R. Damaševičius, et al., “Intrusion detection in healthcare 4.0 Internet of Things systems via metaheuristics optimized machine learning,” Sustainability, vol. 15, no. 16, Art. no. 16, 2023, doi: 10.3390/su151612563.

    [14]   R. Gupta, S. Tanwar, S. Tyagi, and N. Kumar, “Machine learning models for secure data analytics: a taxonomy and threat model,” Computer Communications, vol. 153, pp. 406–440, 2020, doi: 10.1016/j.comcom.2020.02.008.

    [15]   I. H. Sarker, Y. B. Abushark, F. Alsolami, and A. I. Khan, “IntruDTree: a machine learning based cyber security intrusion detection model,” Symmetry, vol. 12, no. 5, Art. no. 5, 2020, doi: 10.3390/sym12050754.

    [16]   Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa, and C. F. M. Foozy, “Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDS2017 dataset,” IEEE Access, vol. 9, pp. 22351–22370, 2021, doi: 10.1109/ACCESS.2021.3056614.

    [17] Y. Imrana, Y. Xiang, L. Ali, and Z. Abdul-Rauf, “A bidirectional LSTM deep learning approach for intrusion detection,” Expert Systems with Applications, vol. 185, p. 115524, 2021, doi: 10.1016/j.eswa.2021.115524.

    [18]   A. Sharma, H. Babbar, S. Rani, D. K. Sah, S. Sehar, et al., “MHSEER: a meta-heuristic secure and energy-efficient routing protocol for wireless sensor network-based industrial IoT,” Energies, vol. 16, no. 10, Art. no. 10, 2023, doi: 10.3390/en16104198.

    [19]   A. Kanneboina and G. Sundaram, “Improving security performance of Internet of Medical Things using hybrid metaheuristic model,” Multimedia Tools and Applications, 2024, doi: 10.1007/s11042-024-19188-7.

    [20]   S. Gali and V. Nidumolu, “An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things,” Cluster Computing, vol. 25, no. 3, pp. 1779–1789, 2022, doi: 10.1007/s10586-021-03473-3.

    [21]   O. Kuznetsov, D. Zakharov, and E. Frontoni, “Deep learning-based biometric cryptographic key generation with post-quantum security,” Multimedia Tools and Applications, vol. 83, no. 19, pp. 56909–56938, 2024, doi: 10.1007/s11042-023-17714-7.

    [22]   P. Arpaia, F. Caputo, A. Cioffi, A. Esposito, and F. Isgrò, “Uncertainty analysis in cryptographic key recovery for machine learning-based power measurements attacks,” IEEE Transactions on Instrumentation and Measurement, vol. 72, pp. 1–8, 2023, doi: 10.1109/TIM.2023.3284933.

    [23]   S. Singh and D. P. Vidyarthi, “An integrated approach of ML-metaheuristics for secure service placement in fog-cloud ecosystem,” Internet of Things, vol. 22, p. 100817, 2023, doi: 10.1016/j.iot.2023.100817.

    [24]  J. Kakkottakath Valappil Thekkepuryil, D. P. Suseelan, and P. M. Keerikkattil, “An effective meta-heuristic based multi-objective hybrid optimization method for workflow scheduling in cloud computing environment,” Cluster Computing, vol. 24, no. 3, pp. 2367–2384, 2021, doi: 10.1007/s10586-021-03269-5.

    [25]   M. S. Akhtar and T. Feng, “Malware analysis and detection using machine learning algorithms,” Symmetry, vol. 14, no. 11, Art. no. 11, 2022, doi: 10.3390/sym14112304.

    [26]   M. S. Akhtar and T. Feng, “Evaluation of machine learning algorithms for malware detection,” Sensors, vol. 23, no. 2, Art. no. 2, 2023, doi: 10.3390/s23020946.

    [27]   S. Fraihat, S. Makhadmeh, M. Awad, M. A. Al-Betar, and A. Al-Redhaei, “Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified Arithmetic Optimization Algorithm,” Internet of Things, vol. 22, p. 100819, 2023.

    [28]   F. Alqahtani, “AI-driven improvement of monthly average rainfall forecasting in Mecca using grid search optimization for LSTM networks,” Journal of Water and Climate Change, vol. 15, no. 4, pp. 1439–1458, 2024.

    [29]   N. O. Aljehane, H. A. Mengash, M. M. Eltahir, F. A. Alotaibi, S. S. Aljameel, A. Yafoz, and M. Assiri, “Golden jackal optimization algorithm with deep learning assisted intrusion detection system for network security,” Alexandria Engineering Journal, vol. 86, pp. 415–424, 2024.

    [30]   S. Bajpai, K. Sharma, and B. K. Chaurasia, “A hybrid meta-heuristics algorithm: XGBoost-based approach for IDS in IoT,” SN Computer Science, vol. 5, no. 5, p. 537, 2024.

     

     

    Cite This Article As :
    Mahmood, Shahid. Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts. Metaheuristic Optimization Review, vol. , no. , 2025, pp. 41-49. DOI: https://doi.org/10.54216/MOR.040105
    Mahmood, S. (2025). Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts. Metaheuristic Optimization Review, (), 41-49. DOI: https://doi.org/10.54216/MOR.040105
    Mahmood, Shahid. Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts. Metaheuristic Optimization Review , no. (2025): 41-49. DOI: https://doi.org/10.54216/MOR.040105
    Mahmood, S. (2025) . Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts. Metaheuristic Optimization Review , () , 41-49 . DOI: https://doi.org/10.54216/MOR.040105
    Mahmood S. [2025]. Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts. Metaheuristic Optimization Review. (): 41-49. DOI: https://doi.org/10.54216/MOR.040105
    Mahmood, S. "Metaheuristic Optimization for Enhancing Cybersecurity Frameworks: An Overview of Methods and Impacts," Metaheuristic Optimization Review, vol. , no. , pp. 41-49, 2025. DOI: https://doi.org/10.54216/MOR.040105