{"id":"https://openalex.org/W4401508972","doi":"https://doi.org/10.1109/iccworkshops59551.2024.10615911","title":"Enhancing Intrusion Detection in Software Defined Networks with Optimized Feature Selection and Logistic Regression","display_name":"Enhancing Intrusion Detection in Software Defined Networks with Optimized Feature Selection and Logistic Regression","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4401508972","doi":"https://doi.org/10.1109/iccworkshops59551.2024.10615911"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops59551.2024.10615911","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops59551.2024.10615911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042846465","display_name":"Akshat Gaurav","orcid":"https://orcid.org/0000-0002-5796-9424"},"institutions":[{"id":"https://openalex.org/I4210147267","display_name":"Ronin Institute","ror":"https://ror.org/04awze035","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147267"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Akshat Gaurav","raw_affiliation_strings":["Ronin Institute,Montclair,NJ,USA"],"affiliations":[{"raw_affiliation_string":"Ronin Institute,Montclair,NJ,USA","institution_ids":["https://openalex.org/I4210147267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Brij B. Gupta","raw_affiliation_strings":["Asia University,Department of Computer Science and Information Engineering,Taichung,Taiwan,413"],"affiliations":[{"raw_affiliation_string":"Asia University,Department of Computer Science and Information Engineering,Taichung,Taiwan,413","institution_ids":["https://openalex.org/I143578492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086102702","display_name":"Kwok Tai Chui","orcid":"https://orcid.org/0000-0001-7992-9901"},"institutions":[{"id":"https://openalex.org/I8679417","display_name":"Hong Kong Metropolitan University","ror":"https://ror.org/0349bsm71","country_code":"HK","type":"education","lineage":["https://openalex.org/I8679417"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Kwok Tai Chui","raw_affiliation_strings":["Hong Kong Metropolitan University (HKMU),Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong Metropolitan University (HKMU),Hong Kong","institution_ids":["https://openalex.org/I8679417"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086803967","display_name":"Varsha Arya","orcid":"https://orcid.org/0000-0001-7549-4429"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Varsha Arya","raw_affiliation_strings":["Asia University,Taichung,Taiwan"],"affiliations":[{"raw_affiliation_string":"Asia University,Taichung,Taiwan","institution_ids":["https://openalex.org/I143578492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029265765","display_name":"Jinsong Wu","orcid":"https://orcid.org/0000-0003-4720-5946"},"institutions":[{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Jinsong Wu","raw_affiliation_strings":["Universidad de Chile,Chile"],"affiliations":[{"raw_affiliation_string":"Universidad de Chile,Chile","institution_ids":["https://openalex.org/I69737025"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042846465"],"corresponding_institution_ids":["https://openalex.org/I4210147267"],"apc_list":null,"apc_paid":null,"fwci":1.461,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83048374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1809","last_page":"1815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9402999877929688,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7326611280441284},{"id":"https://openalex.org/keywords/logistic-regression","display_name":"Logistic regression","score":0.6888436079025269},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.685825765132904},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6747492551803589},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5996591448783875},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.558854877948761},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4770497679710388},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4738726317882538},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4451279044151306},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4158411920070648},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4154413938522339},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.3200458884239197},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13998055458068848},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08530735969543457}],"concepts":[{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7326611280441284},{"id":"https://openalex.org/C151956035","wikidata":"https://www.wikidata.org/wiki/Q1132755","display_name":"Logistic regression","level":2,"score":0.6888436079025269},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.685825765132904},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6747492551803589},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5996591448783875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.558854877948761},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4770497679710388},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4738726317882538},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4451279044151306},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4158411920070648},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4154413938522339},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.3200458884239197},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13998055458068848},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08530735969543457},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops59551.2024.10615911","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops59551.2024.10615911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2885531127","https://openalex.org/W2886504452","https://openalex.org/W2898685569","https://openalex.org/W2902711202","https://openalex.org/W2983793685","https://openalex.org/W2989155850","https://openalex.org/W2999851733","https://openalex.org/W3021973688","https://openalex.org/W3030243146","https://openalex.org/W3044371223","https://openalex.org/W3101375780","https://openalex.org/W3113418120","https://openalex.org/W3114263020","https://openalex.org/W3120450981","https://openalex.org/W3133738690","https://openalex.org/W3144263932","https://openalex.org/W3158456479","https://openalex.org/W3200823936","https://openalex.org/W3211836086","https://openalex.org/W3217618723","https://openalex.org/W4213101073","https://openalex.org/W4213287278","https://openalex.org/W4213298225","https://openalex.org/W4226488301","https://openalex.org/W4285123618","https://openalex.org/W4285158634","https://openalex.org/W4285232663","https://openalex.org/W4285801505","https://openalex.org/W4294796650","https://openalex.org/W4306787212","https://openalex.org/W4309082205","https://openalex.org/W4309558604","https://openalex.org/W4313425355","https://openalex.org/W4321236570","https://openalex.org/W4383532488","https://openalex.org/W4385321371"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"In":[0],"this":[1],"study,":[2],"we":[3],"present":[4],"a":[5,35,82,92,99],"highly":[6],"effective":[7],"machine":[8],"learning":[9],"model":[10],"for":[11,85,102],"intrusion":[12,109],"detection":[13,110],"in":[14,24,95,105],"Software":[15],"Defined":[16],"Networks":[17],"(SDN),":[18],"showcasing":[19],"remarkable":[20],"accuracy":[21,56],"and":[22,46,61],"precision":[23,60],"identifying":[25],"network":[26,39,96],"threats.":[27],"Our":[28,89],"approach":[29],"utilizes":[30],"an":[31,55],"extensive":[32],"dataset,":[33],"covering":[34],"wide":[36],"array":[37],"of":[38,57,76,108],"flow":[40],"statistics":[41],"to":[42],"differentiate":[43],"between":[44],"normal":[45],"malicious":[47],"traffic.":[48],"The":[49],"model's":[50],"robustness":[51],"is":[52],"demonstrated":[53],"through":[54],"98%,":[58],"with":[59],"recall":[62],"metrics":[63],"substantiated":[64],"by":[65],"F1-scores":[66],"near":[67],"0.98.":[68],"This":[69],"research":[70],"not":[71],"only":[72],"addresses":[73],"the":[74,106],"intricacies":[75],"SDN":[77],"environments":[78],"but":[79],"also":[80],"offers":[81],"scalable":[83],"solution":[84],"evolving":[86],"cyber-security":[87],"challenges.":[88],"findings":[90],"mark":[91],"significant":[93],"advancement":[94],"security,":[97],"providing":[98],"comprehensive":[100],"framework":[101],"future":[103],"developments":[104],"field":[107],"systems.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
