Malicious software [1] is one of the main threats to networks and its assets, as well as individual users. As we approach the Internet of Things and Cyber-Physical Systems era, network traffic becomes more complex and heterogeneous. In recent years, the number of devices connected to the Internet is increased exponentially as well as big data that is produced from them. Also, each device comes with its own protocols and standards. Furthermore, computing devices operate with different protocols and standards and effective traffic monitoring becomes harder. Hence, adversaries conduct more sophisticated attacks against networks so the malicious behaviour can be more difficult to be detected. Simplistic and one-dimensional security countermeasures are likely to fail under such circumstances. Artificial intelligence and particularly learning algorithms seems to be appropriate for detecting cyber attacks. Using machine learning, fast and accurate detection of malicious behaviour is more achievable than ever. A special branch of machine learning algorithms includes nature and bio inspired algorithms. Such algorithms followed models from nature, biology, social systems and life sciences. Some examples include genetic algorithms, swarm intelligence, artificial immune systems, evolutionary algorithms, artificial neural networks, fractal geometry, chaos theory and so on [2]. Nature/Bio-inspired algorithms have an advantage against traditional machine learning algorithms, they focus on optimisation. In detail, nature acts as a method of making something as perfect as possible or choosing the most fitted samples from a population. In practice, this family of algorithms applies these principles in the form of optimisation and finding the best solution to the problem assigned. In anomaly detection, the main objective is to identify the malicious behaviour so these algorithms use their best-fit mechanisms to detect malicious abnormalities. Another beneficial usage of nature/bio inspired algorithms is to optimise the potential features used in attacks detection. An optimal set of features is selected for efficient malware detec