{"id":"https://openalex.org/W7093310821","doi":"https://doi.org/10.1109/idsta66210.2025.11202806","title":"Attack Detection Using Decision Tree and Na\u00efve Bayes with Bat Algorithm-Based Feature Selection","display_name":"Attack Detection Using Decision Tree and Na\u00efve Bayes with Bat Algorithm-Based Feature Selection","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W7093310821","doi":"https://doi.org/10.1109/idsta66210.2025.11202806"},"language":null,"primary_location":{"id":"doi:10.1109/idsta66210.2025.11202806","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta66210.2025.11202806","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Sixth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mosleh M. Abualhaj","orcid":null},"institutions":[{"id":"https://openalex.org/I104941359","display_name":"Al-Ahliyya Amman University","ror":"https://ror.org/00xddhq60","country_code":"JO","type":"education","lineage":["https://openalex.org/I104941359"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mosleh M. Abualhaj","raw_affiliation_strings":["Al-Ahliyya Amman University,Department of Networks and Cybersecurity,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Al-Ahliyya Amman University,Department of Networks and Cybersecurity,Amman,Jordan","institution_ids":["https://openalex.org/I104941359"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohammad Sh. Daoud","orcid":null},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohammad Sh. Daoud","raw_affiliation_strings":["College of Engineering, Al Ain University,Abu Dhabi,United Arab,Emirates"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Al Ain University,Abu Dhabi,United Arab,Emirates","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ali Al-Allawee","orcid":null},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Ali Al-Allawee","raw_affiliation_strings":["University of Mosul,Computer Science Department,Mosul,Iraq"],"affiliations":[{"raw_affiliation_string":"University of Mosul,Computer Science Department,Mosul,Iraq","institution_ids":["https://openalex.org/I12150220"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hani Al-Mimi","orcid":null},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Hani Al-Mimi","raw_affiliation_strings":["Al-Zaytooanh University of Jordan,Faculty of Science and Information Technology,Department of Cybersecurity,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Al-Zaytooanh University of Jordan,Faculty of Science and Information Technology,Department of Cybersecurity,Amman,Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohammed Anbar","orcid":null},"institutions":[{"id":"https://openalex.org/I139322472","display_name":"Universiti Sains Malaysia","ror":"https://ror.org/02rgb2k63","country_code":"MY","type":"education","lineage":["https://openalex.org/I139322472"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohammed Anbar","raw_affiliation_strings":["National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia,Penang,Malaysia"],"affiliations":[{"raw_affiliation_string":"National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia,Penang,Malaysia","institution_ids":["https://openalex.org/I139322472"]}]},{"author_position":"last","author":{"id":null,"display_name":"Alhamza Munther","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108041","display_name":"Sur University College","ror":"https://ror.org/01m58xt27","country_code":"OM","type":"education","lineage":["https://openalex.org/I4210108041"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Alhamza Munther","raw_affiliation_strings":["College of Computing and Information Sciences, University Technology and Applied Sciences,Information Technology Department,Sur,Oman"],"affiliations":[{"raw_affiliation_string":"College of Computing and Information Sciences, University Technology and Applied Sciences,Information Technology Department,Sur,Oman","institution_ids":["https://openalex.org/I4210108041"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I104941359"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89170701,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"141","last_page":"145"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1808999925851822,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.1808999925851822,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.09839999675750732,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13324","display_name":"Scientific and Engineering Research Topics","score":0.08659999817609787,"subfield":{"id":"https://openalex.org/subfields/3506","display_name":"Periodontics"},"field":{"id":"https://openalex.org/fields/35","display_name":"Dentistry"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.7081000208854675},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5996999740600586},{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.5296000242233276},{"id":"https://openalex.org/keywords/bayes-theorem","display_name":"Bayes' theorem","score":0.5214999914169312},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4731000065803528},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4465000033378601},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.42309999465942383},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.3871000111103058}],"concepts":[{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.7081000208854675},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6420999765396118},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5996999740600586},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5834000110626221},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.5296000242233276},{"id":"https://openalex.org/C207201462","wikidata":"https://www.wikidata.org/wiki/Q182505","display_name":"Bayes' theorem","level":3,"score":0.5214999914169312},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5213000178337097},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4731000065803528},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4465000033378601},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.42309999465942383},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3871000111103058},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3734999895095825},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3431999981403351},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3285999894142151},{"id":"https://openalex.org/C109718341","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Metaheuristic","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C5481197","wikidata":"https://www.wikidata.org/wiki/Q16766476","display_name":"Decision tree learning","level":3,"score":0.30489999055862427},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.30070000886917114},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C150325174","wikidata":"https://www.wikidata.org/wiki/Q4335500","display_name":"Optimal decision","level":3,"score":0.26510000228881836},{"id":"https://openalex.org/C84839998","wikidata":"https://www.wikidata.org/wiki/Q5249245","display_name":"Decision rule","level":2,"score":0.2603999972343445},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idsta66210.2025.11202806","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta66210.2025.11202806","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Sixth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4621420204639435,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2032719427","https://openalex.org/W2037026906","https://openalex.org/W2516066574","https://openalex.org/W2793412195","https://openalex.org/W2926475966","https://openalex.org/W3036517673","https://openalex.org/W3106741970","https://openalex.org/W3120149888","https://openalex.org/W3131991398","https://openalex.org/W4200529309","https://openalex.org/W4226305845","https://openalex.org/W4285065898","https://openalex.org/W4285818296","https://openalex.org/W4381956331","https://openalex.org/W4388828728","https://openalex.org/W4389639038","https://openalex.org/W4399110828","https://openalex.org/W4400812610","https://openalex.org/W4403938855","https://openalex.org/W4403941556","https://openalex.org/W4405061937","https://openalex.org/W4405062006","https://openalex.org/W4405185954","https://openalex.org/W4407682192","https://openalex.org/W4408164402","https://openalex.org/W4410044578"],"related_works":[],"abstract_inverted_index":{"Currently,":[0],"several":[1,21],"algorithms":[2,51],"in":[3,30,84],"machine":[4],"learning":[5],"(ML)":[6],"are":[7],"employed":[8],"to":[9,37,66],"enhance":[10],"the":[11,24,31,38,43,53,58,68,76,101,104,127,131],"detection":[12,25],"of":[13,26,75,86],"attacks":[14,27],"on":[15,28,52],"networks.":[16],"The":[17,73,91,121],"developers":[18],"have":[19],"suggested":[20],"solutions":[22],"for":[23],"networks":[29],"previous":[32],"works.":[33],"This":[34],"paper":[35],"contributes":[36],"earlier":[39],"works":[40],"by":[41],"employing":[42],"Decision":[44],"Tree":[45],"(DT)":[46],"and":[47,70,78,89,98,113,118,134],"Na\u00efve":[48],"Bayes":[49],"(NB)":[50],"UNSW-NB15":[54],"dataset.":[55],"In":[56],"addition,":[57],"Bat":[59],"Algorithm":[60],"(BA)":[61],"metaheuristic":[62],"optimizer":[63],"is":[64,82],"used":[65],"lessen":[67],"irrelevant":[69],"redundant":[71],"features.":[72],"achievement":[74],"DT":[77,92,125,136],"NB":[79,105,135],"algorithm":[80],"classifiers":[81],"evaluated":[83],"terms":[85],"accuracy,":[87],"Precision,":[88,97,117],"Recall.":[90,99],"achieved":[93,106,126,137],"100":[94],"%":[95,115],"Accuracy,":[96,116],"On":[100],"other":[102],"hand,":[103],"<tex":[107],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[108],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$99.81":[109],"\\%,":[110],"99.87":[111],"\\%$</tex>,":[112],"99.91":[114],"Recall,":[119],"respectively.":[120],"results":[122,129],"show":[123],"that":[124],"optimal":[128,139],"with":[130],"BA":[132],"algorithm,":[133],"nearly":[138],"results.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-02-25T08:12:03.925757","created_date":"2025-10-24T00:00:00"}
