{"id":"https://openalex.org/W2160761127","doi":"https://doi.org/10.1109/icitst.2009.5402584","title":"Significant of features selection for detecting network intrusions","display_name":"Significant of features selection for detecting network intrusions","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2160761127","doi":"https://doi.org/10.1109/icitst.2009.5402584","mag":"2160761127"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2009.5402584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046461117","display_name":"Wafa Alsharafat","orcid":null},"institutions":[{"id":"https://openalex.org/I31079310","display_name":"Al al-Bayt University","ror":"https://ror.org/028jh2126","country_code":"JO","type":"education","lineage":["https://openalex.org/I31079310"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"W.S. Al-Sharafat","raw_affiliation_strings":["Al Al-Bayt University, Jordan"],"affiliations":[{"raw_affiliation_string":"Al Al-Bayt University, Jordan","institution_ids":["https://openalex.org/I31079310"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013844021","display_name":"Reyadh S. Naoum","orcid":null},"institutions":[{"id":"https://openalex.org/I145380033","display_name":"Amman Arab University","ror":"https://ror.org/039xekb14","country_code":"JO","type":"education","lineage":["https://openalex.org/I145380033"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"R. Naoum","raw_affiliation_strings":["Arab Academy for Banking and Financial Sciences, Jordan"],"affiliations":[{"raw_affiliation_string":"Arab Academy for Banking and Financial Sciences, Jordan","institution_ids":["https://openalex.org/I145380033"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5046461117"],"corresponding_institution_ids":["https://openalex.org/I31079310"],"apc_list":null,"apc_paid":null,"fwci":0.3428,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66408687,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11975","display_name":"Evolutionary Algorithms and Applications","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8443963527679443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8147561550140381},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6756187081336975},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5604349374771118},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.555476188659668},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.536423921585083},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5040627717971802},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4991323947906494},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.4899064898490906},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4388032853603363},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10636886954307556}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8443963527679443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8147561550140381},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6756187081336975},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5604349374771118},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.555476188659668},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.536423921585083},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5040627717971802},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4991323947906494},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.4899064898490906},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4388032853603363},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10636886954307556}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2009.5402584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W135902891","https://openalex.org/W194643239","https://openalex.org/W1543456900","https://openalex.org/W2007436726","https://openalex.org/W2039380800","https://openalex.org/W2103806672","https://openalex.org/W2105779206","https://openalex.org/W2121408822","https://openalex.org/W2273254134","https://openalex.org/W2291193707","https://openalex.org/W2549403671"],"related_works":["https://openalex.org/W2337148208","https://openalex.org/W3004832009","https://openalex.org/W1971929717","https://openalex.org/W3036013726","https://openalex.org/W1724519426","https://openalex.org/W2061466315","https://openalex.org/W2355532322","https://openalex.org/W2368329025","https://openalex.org/W3157271777","https://openalex.org/W1485296229"],"abstract_inverted_index":{"Intrusion":[0,87],"Detection":[1,88],"System":[2,89,136],"(IDS)":[3],"is":[4,64,82,154],"used":[5],"to":[6,52,65,77,100,122,127,150,171],"identify":[7],"unknown":[8],"or":[9,156],"new":[10],"type":[11],"of":[12,30,61,93,141],"attacks":[13],"especially":[14,55],"in":[15,56,86],"dynamic":[16],"environments":[17],"as":[18],"business":[19],"and":[20,104,160],"mobile":[21],"networks.":[22],"For":[23],"that":[24,34,113],"importance,":[25],"IDS":[26],"has":[27,73],"become":[28],"one":[29],"targeted":[31],"research":[32],"area":[33],"focuses":[35],"on":[36,167],"information":[37],"security.":[38],"Among":[39],"different":[40,110],"techniques,":[41],"Steady":[42],"State":[43],"Genetic-Based":[44],"Machine":[45],"Learning":[46],"Algorithm":[47],"(SSGBML)":[48],"offers":[49],"the":[50,94,139],"ability":[51],"detect":[53,172],"intrusions":[54],"changing":[57],"environments.":[58],"The":[59,158],"objective":[60],"this":[62,118],"paper":[63],"incorporate":[66],"several":[67],"feature":[68],"selection.":[69],"Selection":[70],"network":[71,173],"features":[72,98,112,126],"a":[74,84,101],"great":[75],"importance":[76],"increase":[78],"detection":[79,106],"rate,":[80],"which":[81],"itself":[83],"problem":[85,103],"(IDS).":[90],"Since":[91],"elimination":[92],"insignificant":[95],"and/or":[96],"useless":[97],"leads":[99],"simplified":[102],"enhance":[105],"rate.":[107],"By":[108],"combining":[109],"selected":[111],"will":[114,119],"be":[115],"evaluated,":[116],"where":[117],"lead":[120],"us":[121],"determine":[123,151],"suitable":[124],"combination":[125],"attain":[128],"best":[129],"results.":[130],"In":[131],"SSGBML,":[132],"Zeroth":[133],"Level":[134],"Classifier":[135],"(ZCS)":[137],"plays":[138],"role":[140],"detector":[142],"by":[143],"matching":[144],"incoming":[145],"environment":[146],"message":[147],"with":[148],"classifiers":[149],"whether":[152],"it":[153],"normal":[155],"intrusion.":[157],"experiments":[159],"evaluations":[161],"for":[162],"compound":[163],"methods":[164],"were":[165],"performed":[166],"KDD":[168],"99":[169],"dataset":[170],"intrusions.":[174]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
