Novel Hybrid LOA-VCS Metaheuristic Approach with Adaptive Parameter Tuning for Network Intrusion Detection

PDF (919KB), PP.31-44

Views: 0 Downloads: 0

Author(s)

Mohammad Othman Nassar 1 Feras Fares AL-Mashagba 2,*

1. College of Information Technology, Cyber Security Department, Amman Arab University, Amman, Jordan

2. Computer Science department, Faculty of Information Technology, Jerash University, Jerash 26150, Jordan

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2025.05.03

Received: 16 May 2025 / Revised: 24 Jun. 2025 / Accepted: 5 Aug. 2025 / Published: 8 Oct. 2025

Index Terms

Network Intrusion Detection, Hybrid Metaheuristic Algorithms, Lion Optimization Algorithm (LOA), Virus Colony Search (VCS), Adaptive Parameter Tuning, Cyber Security, Anomaly Detection, Machine Learning Optimization

Abstract

The increasing complexity and dynamism of modern cyber threats necessitate intelligent and adaptive network intrusion detection systems (NIDS). This paper proposes a novel hybrid metaheuristic approach that combines the Lion Optimization Algorithm (LOA) with the Virus Colony Search (VCS), enhanced by adaptive parameter tuning mechanisms. The proposed LOA-VCS hybrid algorithm addresses limitations in prior single and hybrid metaheuristic by alternating exploration and exploitation strategies across epochs, optimizing detection performance in high-dimensional feature spaces. Unlike previous hybrid metaheuristics that use fixed or non-adaptive control, our model uniquely alternates LOA and VCS phases adaptively across epochs to enhance convergence and detection robustness. A real-world intrusion detection dataset evaluated the LOA-VCS model with 98.4% detection accuracy, an F1-score of 0.976, and an AUC of 0.986, consistently outperforming the standalone LOA and VCS baselines. These results emphasize the power of adaptive hybrid met heuristics in maintaining low false alarms while ensuring strong recall for NIDS. The proposed approach can be deployed in scalable, high-speed systems in today’s contemporary cyber security environments.

Cite This Paper

Mohammad Othman Nassar, Feras Fares AL-Mashagba, "Novel Hybrid LOA-VCS Metaheuristic Approach with Adaptive Parameter Tuning for Network Intrusion Detection", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.5, pp.31-44, 2025. DOI:10.5815/ijcnis.2025.05.03

Reference

[1]A. Shanbhag, S. Vincent, S. B. B. Gowda, O. P. Kumar, and S. A. J. Francis, “Leveraging Metaheuristics for Feature Selection With Machine Learning Classification for Malicious Packet Detection in Computer Networks,” IEEE Access, vol. 12, 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1168605879
[2]R. Alkanhel et al., “Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization,” Computers Materials & Continua, vol. 73, pp. 4337–4355, Oct. 2022. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1152369098
[3]Z. A. Varzaneh and S. Hosseini, “An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection,” Computer and Knowledge Engineering, Dec. 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1184593527
[4]A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing Cybersecurity: A Comprehensive Review of AI-Driven Detection Techniques,” Journal of Big Data, vol. 11, Aug. 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1174495068
[5]A. A. Mazroa et al., “Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment,” IEEE Access, Jan. 2025. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1184180498
[6]M. O. Nassar and F. F. Al-Mashagba, “Optimal Ensemble Learning with Meta-Heuristics for Multiclass Classification of Syscall-Binder Interactions in Mobile Applications,” J. Wireless Mobile Netw., Ubiquitous Comput., Dependable Appl., vol. 16, no. 1, pp. 26–48, 2025. [Online]. Available: https://doi.org/10.58346/JOWUA.2025.I1.002
[7]M. Al Ghamri, D. Ibrahim, R. Sihwail, and M. Shehab, “Whale Optimization Algorithm for Feature Selection Enhances Classification in Malware Datasets,” J. Comput. Cogn. Eng., 2024. [Online]. Available: https://doi.org/10.47852/bonviewJCCE42024233
[8]F. Shannaq et al., “Exploring Metaheuristic Optimization Algorithms in the Context of Textual Cyberharassment: A Systematic Review,” Expert Systems, vol. 42, p. e13826, 2025. [Online]. Available: https://doi.org/10.1111/exsy.13826
[9]M. Shehab, I. Mashal, Z. Momani et al., “Harris Hawks Optimization Algorithm: Variants and Applications,” Arch. Computat. Methods Eng., vol. 29, pp. 5579–5603, 2022. [Online]. Available: https://doi.org/10.1007/s11831-022-09780-1
[10]D. Ibrahim, R. Sihwail, K. A. Z. Arrifin, A. Abuthawabeh, and M. Mizher, “A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm,” Symmetry, vol. 15, no. 7, p. 1305, 2023. [Online]. Available: https://doi.org/10.3390/sym15071305
[11]Abbas, A., et al. “Enhancing Secure Systems Using Hybrid Ensemble Models,” International Journal of Information Security, 2023.
[12]Balogun, A. O., et al. “Hybrid Metaheuristic Algorithms for Dimensionality Reduction in Intrusion Detection,” Computers & Security, vol. 112, pp. 101074, 2022.
[13]Kunhare, N., et al. “Optimization of Intrusion Detection Using Hybrid Classifiers with Genetic Algorithm,” Procedia Computer Science, vol. 185, pp. 505–512, 2021.
[14]Ding, X., et al. “A Unified Multi-Class Feature Selection Framework for Microarray Data,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2023.
[15]Aldabbagh, A. M., and Syed, M. N. “Metaheuristic Approach to Artificial Neural Network Optimization,” in Proc. of SNAMS 2023, IEEE, pp. 1–8.
[16]R. AlGhamdi, "Design of Network Intrusion Detection System Using Lion Optimization-Based Feature Selection with Deep Learning Model," Mathematics, vol. 11, no. 22, p. 4607, Nov. 2023, doi: 10.3390/math11224607.
[17]A. Salimifard, A. Akbari, and E. Rashedi, “A Novel Metaheuristic Algorithm Based on Virus Colony Search,” Computers & Industrial Engineering, vol. 141, p. 106284, 2020. [Online]. Available: https://doi.org/10.1016/j.cie.2020.106284
[18]A. Verma and V. Ranga, “Statistical Analysis of CIDDS-001 Dataset for Network Intrusion Detection Systems Using Distance-Based Machine Learning,” Procedia Computer Science, vol. 132, pp. 1028–1035, 2018. [Online]. Available: https://doi.org/10.1016/j.procs.2017.12.091
[19]M. M. Fard and H. H. Ashtiani, “Reducing False Negatives in Anomaly-Based Intrusion Detection Systems: A Study Using Supervised and Unsupervised Learning,” Security and Privacy, vol. 3, no. 1, 2020. [Online]. Available: https://doi.org/10.1002/spy2.94
[20]R. Alkanhel et al., “Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems,” Computers Materials & Continua, vol. 73, 2022. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1152369089
[21]O. Mjahed et al., “Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion,” CMES, 2023. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1157470088
[22]Z. A. Varzaneh and S. Hosseini, “An Improved Equilibrium Optimization Algorithm for Feature Selection,” Scientific Reports, 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1174676554
[23]M. Alotaibi et al., “Hybrid GWQBBA Model for Optimized Classification of Attacks in IDS,” Alexandria Engineering Journal, 2025. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1183887224
[24]W. A. Ghanem et al., “Cyber Intrusion Detection System Based on Multiobjective Binary Bat Algorithm,” IEEE Access, 2022. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1149604245
[25]A. Varzaneh and S. Hosseini, “Binary Levy-Opposition Equilibrium Optimization for IDS,” Scientific Reports, 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1174676554
[26]Ghanbarzadeh, R., Hosseinalipour, A., & Ghaffari, A. (2023). A novel network intrusion detection method based on metaheuristic optimisation algorithms. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-023-04571-3
[27]P. Sanju, “Enhancing Intrusion Detection in IoT Systems Using Hybrid Metaheuristics and RNNs,” Journal of Engineering Research, 2023. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1159934155
[28]V. Choudhary et al., “Towards Secure IoT Networks Using Metaheuristics and CNN,” MethodsX, 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1171368328
[29]M. Ragab, S. M. Alshammari, and A. S. Al-Ghamdi, “Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System,” Computer Systems Science and Engineering, 2023. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1162777107
[30]M. M. Othman and K. R. Ku-Mahamud, “Hybrid Metaheuristic Algorithms for Feature Selection in Classification: A Systematic Literature Review,” Research Square, 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1171312120
[31]Xavier Larriva-Novo et al., “Post-Hoc Categorization Based on Explainable AI and Reinforcement Learning for Improved Intrusion Detection,” Applied Sciences, vol. 14, no. 24, p. 11511, 2024. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1183337312
[32]Mohamad Khayat et al., “Empowering Security Operation Center with Artificial Intelligence and Machine Learning—A Systematic Literature Review,” IEEE Access, vol. 13, 2025. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1184837099
[33]Krti Tallam, “CyberSentinel: An Emergent Threat Detection System for AI Security,” arXiv preprint, 2025. [Online]. Available: https://app.dimensions.ai/details/publication/pub.1185863063