Enhancing E-Commerce Security through Metaheuristic Optimization: A Migrating Birds Optimization Approach to Cyber Attack Mitigation

 Mitat Uysal , Aynur Uysal , Elif Erçelik
Doğuş University, İstanbul 34764, Turkey
muysal@dogus.edu.tr
auysal@dogus.edu.tr
eercelik@dogus.edu.tr
DOI: 10.46793/BISEC25.066U

 

ABSTRACT:  E-commerce platforms are becoming increasingly vulnerable to so-phisticated cyber threats, such as distributed denial of service (DDoS) attacks, phishing schemes and SQL injection attempts. Traditional cybersecurity frameworks are known as effective in static environments however they often lack the adaptability required to respond to dynamic and evolving attack vec-tors. This study introduces a novel application of the Migrating Birds Optimiza-tion (MBO) algorithm — a nature-inspired metaheuristic — to dynamically op-timize security strategies for e-commerce systems. By modelling the adaptive and cooperative behavior of migratory birds, the proposed model allows for the continuous adjustment of intrusion prevention policies in response to changing threat landscapes. Comprehensive simulation studies demonstrate that the MBO-based approach significantly outperforms conventional static approaches in discovering improved security settings, resulting in enhanced detection accu-racy and improved mitigation efficiency. The results specify the potential of MBO as an extensible and robust framework for improving cyber-security for commercial cyberspaces.

KEYWORDS:  E-commerce security, Cyber attacks, Metaheuristic optimization, Migrating Birds Optimization, Intrusion prevention.

REFERENCES:

  1. Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer Systems 28(3), 583–592 (2012).
  2. Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art. Computer Networks 44(5), 643–666 (2004).
  3. Djiroun, F.Z., Djenouri, D.: MAC Protocols With Wake-Up Radio for Wireless Sensor Networks: A Review. IEEE Communications Surveys & Tutorials 19(1), 587–618 (2017).
  4. Jyothi, K.K., Borra, S.R., Srilakshmi, K. et al.: A Novel Optimized Neural Network Model for Cyber Attack Detection Using Enhanced Whale Optimization Algorithm. Scientific Re-ports 14, 5590 (2024).
  5. Yang, X.S.: Nature-Inspired Optimization Algorithms. Elsevier (2014).
  6. Kennedy, J., Eberhart, R.: Particle Swarm Optimization. In: Proceedings of the IEEE Inter-national Conference on Neural Networks, 4, 1942–1948 (1995).
  7. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addi-son-Wesley (1989).
  8. Kirkpatrick, S., Gelatt, C.D. Jr., Vecchi, M.P.: Optimization by Simulated Annealing. Sci-ence 220(4598), 671–680 (1983).
  9. Mirjalili, S.: Evolutionary Algorithms and Neural Networks: Theory and Applications. Springer, DOI: https://doi.org/10.1007/978-3-319-93025-1
  10. Duman, E., Uysal, M., Kayalı, A.F.: Migrating Birds Optimization: A New Metaheuristic Approach and Its Application to the Quadratic Assignment Problem. Information Sciences 217(1), 254–263 (2011).
  11. Uysal, M., Uysal, M.O., Pehlivan, N.: Solving UAV-Path Problem Using Metaheuristic Op-timization Algorithms. International Journal of Mathematics and Computers in Simulation 16, 98–102 (2022).
  12. Uysal, M., Uysal, A.: Multi Objective Migrating Birds and Particle Swarm Optimization Algorithms. International Journal of Innovative Science and Research Technology 10(3), DOI: https://doi.org/10.38124/ijisrt/25mar689.
  13. Uysal, M., Uysal, A.: Optimal Path Planning for UAVs Using a Hybrid MBO+FA Algo-rithm. International Journal of Modern Research in Engineering and Technology (IJMRET) 9(12), December 2024.
  14. Kaur, P. et al.: A Review of Detection Approaches for Distributed Denial of Service At-tacks. Systems Science and Control Engineering 5(1) (2017).
  15. Osanaiye, O. et al.: Distributed Denial of Service (DDoS) Resilience in Cloud: Review and Conceptual Cloud DDoS Mitigation Framework. Journal of Network and Computer Appli-cations 67, 147–165 (2016).
  16. Gupta, S. et al.: A Literature Survey on Social Engineering Attacks: Phishing Attack. In: International Conference on Computing, Communication and Automation (ICCCA2016), 537–540 (2016).
  17. Goel, D., Jain, A.K.: Mobile Phishing Attacks and Defence Mechanisms: State of Art and Open Research Challenges. Computers and Security 73, 519–544 (2018).
  18. Abdullayev, V., Cahuan, A.S.: SQL Injection Attack: Quick View. Mesopotamian Journal of Cybersecurity 2023, 30–34. DOI: https://doi.org/10.58496/MJCS/2023/006
  19. Wei, K. et al.: Preventing SQL Injection Attacks in Stored Procedures. In: Australian Software Engineering Conference (ASWEC’06), April 2016. DOI: 10.1109/ASWEC.2006.40

 

IZVOR: Proceedings of the 16th International Conference on Business Information Security BISEC’2025