{"id":"https://openalex.org/W3208245024","doi":"https://doi.org/10.1109/ccci52664.2021.9583206","title":"Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection","display_name":"Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection","publication_year":2021,"publication_date":"2021-10-15","ids":{"openalex":"https://openalex.org/W3208245024","doi":"https://doi.org/10.1109/ccci52664.2021.9583206","mag":"3208245024"},"language":"en","primary_location":{"id":"doi:10.1109/ccci52664.2021.9583206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci52664.2021.9583206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039199020","display_name":"Dongliang Xuan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongliang Xuan","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054424212","display_name":"Huaping Hu","orcid":"https://orcid.org/0000-0002-1651-0385"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaping Hu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069314924","display_name":"Bidong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bidong Wang","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100461646","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0002-3603-6617"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039199020"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.9169,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7658065,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.8140522241592407},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081235885620117},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7846091389656067},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7350083589553833},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6893762350082397},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5760306119918823},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5384433269500732},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5252803564071655},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5154555439949036},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5014054775238037},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47028401494026184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18046635389328003}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.8140522241592407},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081235885620117},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7846091389656067},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7350083589553833},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6893762350082397},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5760306119918823},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5384433269500732},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5252803564071655},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5154555439949036},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5014054775238037},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47028401494026184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18046635389328003},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccci52664.2021.9583206","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci52664.2021.9583206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1495061682","https://openalex.org/W1560107318","https://openalex.org/W2076384720","https://openalex.org/W2099940443","https://openalex.org/W2100537916","https://openalex.org/W2108318847","https://openalex.org/W2148143831","https://openalex.org/W2188268519","https://openalex.org/W2267339884","https://openalex.org/W2287408518","https://openalex.org/W2330219538","https://openalex.org/W2533684757","https://openalex.org/W2615173403","https://openalex.org/W2768211408","https://openalex.org/W2794890550","https://openalex.org/W2840169530","https://openalex.org/W2921134108","https://openalex.org/W2942576940","https://openalex.org/W2957352360","https://openalex.org/W2974474972","https://openalex.org/W2980576170","https://openalex.org/W2996763767","https://openalex.org/W2999733746","https://openalex.org/W3014732532","https://openalex.org/W3018495625","https://openalex.org/W3042855339","https://openalex.org/W3093410479","https://openalex.org/W3143021555","https://openalex.org/W3214373139","https://openalex.org/W4237332204","https://openalex.org/W6633497745","https://openalex.org/W6686806119","https://openalex.org/W6696151112","https://openalex.org/W6803782233"],"related_works":["https://openalex.org/W2387580700","https://openalex.org/W2899285606","https://openalex.org/W2746581472","https://openalex.org/W60934498","https://openalex.org/W2018632273","https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301"],"abstract_inverted_index":{"With":[0],"the":[1,42,120,123],"emergence":[2],"of":[3,41,46,58,122,157],"increasingly":[4],"growing":[5],"network":[6,8,31,54,85],"threats,":[7],"security":[9,86],"becomes":[10],"a":[11,93,155],"major":[12],"issue":[13],"which":[14,34],"causes":[15],"huge":[16],"existing":[17],"and":[18,52,64,78,102,129,143,154],"potential":[19],"losses,":[20],"such":[21],"as":[22],"WannaCry.":[23],"Various":[24],"methods":[25],"had":[26],"been":[27],"adopted":[28],"to":[29,48,67,118,150],"maintain":[30],"security,":[32],"among":[33],"Intrusion":[35],"Detection":[36],"System":[37],"(IDS)":[38],"is":[39],"one":[40],"most":[43],"essential":[44],"parts":[45],"cybersecurity":[47],"defense":[49],"against":[50,127],"sophisticated":[51],"ever-growing":[53],"attacks.":[55],"A":[56],"number":[57],"researchers":[59],"have":[60],"studied":[61],"comprehensive":[62],"datasets":[63,117],"effective":[65],"approaches":[66],"build":[68],"IDS.":[69],"Machine":[70],"learning":[71,99],"models":[72,100,131],"are":[73],"also":[74,111],"applied":[75],"in":[76,82,152,159],"IDS":[77,95,140],"obtained":[79],"considerable":[80],"results":[81,134],"building":[83],"better":[84],"system.":[87],"In":[88],"this":[89],"paper,":[90],"we":[91],"proposed":[92,138],"two-stage":[94,124,139],"based":[96],"on":[97,114],"machine":[98],"RF":[101,128,142],"SVM":[103,130,144],"optimized":[104],"with":[105,145],"Feature":[106],"Selection":[107],"algorithm":[108],"CFS.":[109],"We":[110],"conducted":[112],"experiments":[113],"NSL-KDD":[115],"benchmark":[116],"evaluate":[119],"performance":[121],"IDS,":[125],"comparing":[126],"respectively.":[132],"The":[133],"demonstrated":[135],"that":[136],"our":[137],"outperformed":[141],"an":[146],"increase":[147],"from":[148],"4.31%":[149],"14.62%":[151],"Precision":[153],"reduction":[156],"93.84%":[158],"time":[160],"than":[161],"SVM.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
