{"id":"https://openalex.org/W4285227650","doi":"https://doi.org/10.1109/access.2022.3171660","title":"An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Na\u00efve Bayes (LNB) Classification Approach for Network Intrusion Detection System","display_name":"An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Na\u00efve Bayes (LNB) Classification Approach for Network Intrusion Detection System","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285227650","doi":"https://doi.org/10.1109/access.2022.3171660"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3171660","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3171660","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09765958.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09765958.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067888843","display_name":"Shitharth Selvarajan","orcid":"https://orcid.org/0000-0002-4931-724X"},"institutions":[{"id":"https://openalex.org/I4210107262","display_name":"Amhara Agricultural Research Institute","ror":"https://ror.org/01vwxpj86","country_code":"ET","type":"government","lineage":["https://openalex.org/I4210107262"]},{"id":"https://openalex.org/I4387152840","display_name":"Kebri Dehar University","ror":"https://ror.org/00r6xxj20","country_code":null,"type":"education","lineage":["https://openalex.org/I4387152840"]}],"countries":["ET"],"is_corresponding":true,"raw_author_name":"S. Shitharth","raw_affiliation_strings":["Department of Computer Science and Engineering, Kebri Dehar University, Kebri Dehar, Somali, Ethiopia"],"raw_orcid":"https://orcid.org/0000-0002-4931-724X","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Kebri Dehar University, Kebri Dehar, Somali, Ethiopia","institution_ids":["https://openalex.org/I4210107262","https://openalex.org/I4387152840"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076524025","display_name":"Pravin R. Kshirsagar","orcid":"https://orcid.org/0000-0002-7381-6284"},"institutions":[{"id":"https://openalex.org/I4210146358","display_name":"Raisoni Group of Institutions","ror":"https://ror.org/03dp11s58","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210146358"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pravin R. Kshirsagar","raw_affiliation_strings":["Department of Artificial Intelligence, G. H. Raisoni College of Engineering, Nagpur, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0002-7381-6284","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence, G. H. Raisoni College of Engineering, Nagpur, Maharashtra, India","institution_ids":["https://openalex.org/I4210146358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048183622","display_name":"Praveen Kumar Balachandran","orcid":"https://orcid.org/0000-0003-1561-1376"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Praveen Kumar Balachandran","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, Vardhaman College of Engineering, Hyderabad, Telangana, India","Department of Electrical and Electronics Engineering, Vardhaman College of Engineering, Hyderabad, TS 501218, India"],"raw_orcid":"https://orcid.org/0000-0003-1561-1376","affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Vardhaman College of Engineering, Hyderabad, Telangana, India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Vardhaman College of Engineering, Hyderabad, TS 501218, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067996737","display_name":"Khaled H. Alyoubi","orcid":"https://orcid.org/0000-0001-8487-8643"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Khaled H. Alyoubi","raw_affiliation_strings":["Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074397206","display_name":"Alaa O. Khadidos","orcid":"https://orcid.org/0000-0003-3297-3715"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Alaa O. Khadidos","raw_affiliation_strings":["Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-3297-3715","affiliations":[{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067888843"],"corresponding_institution_ids":["https://openalex.org/I4210107262","https://openalex.org/I4387152840"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":8.5538,"has_fulltext":true,"cited_by_count":63,"citation_normalized_percentile":{"value":0.98167671,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"46424","last_page":"46441"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8066853284835815},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.7039023637771606},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6791757345199585},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.6490654945373535},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6266229748725891},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.6105330586433411},{"id":"https://openalex.org/keywords/dbscan","display_name":"DBSCAN","score":0.5443649888038635},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5249329209327698},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.43922510743141174},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4389411509037018},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4347474277019501},{"id":"https://openalex.org/keywords/fuzzy-clustering","display_name":"Fuzzy clustering","score":0.19489538669586182},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.16970238089561462},{"id":"https://openalex.org/keywords/canopy-clustering-algorithm","display_name":"Canopy clustering algorithm","score":0.1205015480518341}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8066853284835815},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.7039023637771606},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6791757345199585},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.6490654945373535},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6266229748725891},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.6105330586433411},{"id":"https://openalex.org/C46576248","wikidata":"https://www.wikidata.org/wiki/Q1114630","display_name":"DBSCAN","level":5,"score":0.5443649888038635},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5249329209327698},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.43922510743141174},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4389411509037018},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4347474277019501},{"id":"https://openalex.org/C17212007","wikidata":"https://www.wikidata.org/wiki/Q5511111","display_name":"Fuzzy clustering","level":3,"score":0.19489538669586182},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.16970238089561462},{"id":"https://openalex.org/C104047586","wikidata":"https://www.wikidata.org/wiki/Q5033439","display_name":"Canopy clustering algorithm","level":4,"score":0.1205015480518341}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3171660","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3171660","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09765958.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9b3d292fe2134e08ad32fd0579ffe9de","is_oa":false,"landing_page_url":"https://doaj.org/article/9b3d292fe2134e08ad32fd0579ffe9de","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 46424-46441 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3171660","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3171660","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09765958.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4285227650.pdf","grobid_xml":"https://content.openalex.org/works/W4285227650.grobid-xml"},"referenced_works_count":59,"referenced_works":["https://openalex.org/W1169093751","https://openalex.org/W2020651442","https://openalex.org/W2460208041","https://openalex.org/W2473602473","https://openalex.org/W2611645847","https://openalex.org/W2782735691","https://openalex.org/W2789760348","https://openalex.org/W2790117078","https://openalex.org/W2801589456","https://openalex.org/W2808392682","https://openalex.org/W2810271664","https://openalex.org/W2888031907","https://openalex.org/W2889165715","https://openalex.org/W2889278246","https://openalex.org/W2892556724","https://openalex.org/W2893123663","https://openalex.org/W2893979517","https://openalex.org/W2898943231","https://openalex.org/W2900833923","https://openalex.org/W2902149490","https://openalex.org/W2921364842","https://openalex.org/W2921992353","https://openalex.org/W2926701059","https://openalex.org/W2936809465","https://openalex.org/W2941898360","https://openalex.org/W2948286614","https://openalex.org/W2950250245","https://openalex.org/W2952078967","https://openalex.org/W2953409786","https://openalex.org/W2963197901","https://openalex.org/W2972414240","https://openalex.org/W2982853004","https://openalex.org/W3005630930","https://openalex.org/W3005805195","https://openalex.org/W3009422166","https://openalex.org/W3013386139","https://openalex.org/W3015355370","https://openalex.org/W3024905798","https://openalex.org/W3026790608","https://openalex.org/W3033030226","https://openalex.org/W3036517673","https://openalex.org/W3037233857","https://openalex.org/W3042855339","https://openalex.org/W3042921284","https://openalex.org/W3087417123","https://openalex.org/W3109608767","https://openalex.org/W3113446920","https://openalex.org/W3126814579","https://openalex.org/W3129321264","https://openalex.org/W3131541364","https://openalex.org/W3156522613","https://openalex.org/W3160027800","https://openalex.org/W3161976747","https://openalex.org/W3165574415","https://openalex.org/W3172554013","https://openalex.org/W3184304603","https://openalex.org/W3185692078","https://openalex.org/W3203436613","https://openalex.org/W4205136287"],"related_works":["https://openalex.org/W2086889680","https://openalex.org/W3153505674","https://openalex.org/W4246466849","https://openalex.org/W2997511728","https://openalex.org/W4381745996","https://openalex.org/W2119349310","https://openalex.org/W2995276271","https://openalex.org/W4312478656","https://openalex.org/W3089977948","https://openalex.org/W4379364525"],"abstract_inverted_index":{"ABSTRACTIntrusion":[0],"detection":[1],"and":[2,71,108,117,138,178,217,255],"classification":[3,49,91,227],"have":[4,119],"gained":[5],"significant":[6,57],"attention":[7],"recently":[8],"due":[9],"to":[10,86,93,130,134,174,231,238],"the":[11,32,40,43,46,56,77,98,105,132,140,143,150,162,176,183,186,190,195,203,219,222,234,244,246,249,264,269],"increased":[12],"utilization":[13],"of":[14,23,48,59,101,166,192,248],"networks.":[15],"For":[16],"this":[17,83],"purpose,":[18],"there":[19],"are":[20,200,213],"different":[21,99],"types":[22,100],"Network":[24],"Intrusion":[25],"Detection":[26],"System":[27],"(NIDS)":[28],"approaches":[29],"developed":[30],"in":[31,61],"conventional":[33],"works,":[34],"which":[35,188],"mainly":[36],"focus":[37],"on":[38],"identifying":[39],"intrusions":[41,96],"from":[42,97],"datasets":[44,112],"with":[45,161,168,272],"help":[47],"techniques.":[50],"Still,":[51],"it":[52],"is":[53,146,229,253],"limited":[54],"by":[55,148,152],"problems":[58],"inefficiency":[60],"handling":[62],"large":[63],"dimensional":[64],"datasets,":[65],"high":[66],"computational":[67],"complexity,":[68],"false":[69],"detection,":[70],"more":[72],"time":[73],"consumption":[74],"for":[75,122,181,215],"training":[76,216],"models.":[78],"To":[79],"solve":[80],"these":[81],"problems,":[82],"research":[84],"intends":[85],"develop":[87],"an":[88,154],"innovative":[89],"clustering-based":[90],"methodology":[92],"precisely":[94],"detect":[95],"IDS":[102,111,251],"datasets.":[103],"Here,":[104,194],"most":[106,196],"recent":[107],"extensively":[109],"used":[110,214],"such":[113],"as":[114,237],"NSL-KDD,":[115],"CICIDS,":[116],"Bot-IoT":[118],"been":[120,128],"employed":[121],"detecting":[123],"intrusions.":[124],"Data":[125],"preprocessing":[126],"has":[127],"performed":[129],"normalize":[131],"dataset":[133,220],"eliminate":[135],"irrelevant":[136],"attributes":[137,184],"organize":[139],"features.":[141],"Then,":[142],"data":[144],"separation":[145],"applied":[147],"forming":[149],"clusters":[151],"using":[153,202,257],"intelligent":[155],"Anticipated":[156],"Distance-based":[157],"Clustering":[158],"(ADC)":[159],"incorporated":[160],"Density-Based":[163],"Spatial":[164],"clustering":[165],"applications":[167],"noise":[169],"(DBScan)":[170],"algorithm.":[171],"It":[172],"helps":[173],"find":[175],"distance":[177],"density":[179],"measures":[180],"grouping":[182],"into":[185],"clusters,":[187],"increases":[189],"efficiency":[191],"classification.":[193],"suitable":[197],"optimal":[198],"parameters":[199],"selected":[201],"Perpetual":[204],"Pigeon":[205],"Galvanized":[206],"Optimization":[207],"(PPGO)":[208],"technique.":[209],"The":[210],"extracted":[211],"features":[212],"testing":[218],"samples.Consequently,":[221],"Likelihood":[223],"Naove":[224],"Bayes":[225],"(LNB)":[226],"approach":[228],"implemented":[230],"accurately":[232],"predict":[233],"classified":[235],"label":[236],"whether":[239],"normal":[240],"or":[241],"attack.":[242],"During":[243],"evaluation,":[245],"performance":[247,274],"proposed":[250,265],"framework":[252],"validated":[254],"compared":[256],"various":[258],"evaluation":[259],"metrics.":[260],"Theresults":[261],"show":[262],"that":[263],"ADC-DBScan-LNB":[266],"model":[267],"outperforms":[268],"other":[270],"techniques":[271],"improved":[273],"outcomes.":[275]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":6}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2022-07-14T00:00:00"}
