{"id":"https://openalex.org/W4200592806","doi":"https://doi.org/10.1109/itnac53136.2021.9652151","title":"Performance Enhancement of Intrusion Detection System Using Machine Learning Algorithms with Feature Selection","display_name":"Performance Enhancement of Intrusion Detection System Using Machine Learning Algorithms with Feature Selection","publication_year":2021,"publication_date":"2021-11-24","ids":{"openalex":"https://openalex.org/W4200592806","doi":"https://doi.org/10.1109/itnac53136.2021.9652151"},"language":"en","primary_location":{"id":"doi:10.1109/itnac53136.2021.9652151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac53136.2021.9652151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 31st International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012362485","display_name":"Anuradha Samkham Raju","orcid":null},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Anuradha Samkham Raju","raw_affiliation_strings":["School of Engineering and Technology, CQ University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Technology, CQ University, Sydney, Australia","institution_ids":["https://openalex.org/I74899385"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052650247","display_name":"Md. Mamunur Rashid","orcid":"https://orcid.org/0000-0002-3929-7361"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Md Mamunur Rashid","raw_affiliation_strings":["School of Engineering and Technology, CQ University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Technology, CQ University, Melbourne, Australia","institution_ids":["https://openalex.org/I74899385"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087242242","display_name":"Fariza Sabrina","orcid":"https://orcid.org/0000-0002-8455-2499"},"institutions":[{"id":"https://openalex.org/I74899385","display_name":"Central Queensland University","ror":"https://ror.org/023q4bk22","country_code":"AU","type":"education","lineage":["https://openalex.org/I74899385"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Fariza Sabrina","raw_affiliation_strings":["School of Engineering and Technology, CQ University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Technology, CQ University, Sydney, Australia","institution_ids":["https://openalex.org/I74899385"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012362485"],"corresponding_institution_ids":["https://openalex.org/I74899385"],"apc_list":null,"apc_paid":null,"fwci":0.6113,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7119725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"34","last_page":"39"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7981915473937988},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7857683897018433},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7472981810569763},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.7334591150283813},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6311994194984436},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6125873923301697},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.6027911305427551},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5564643144607544},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5291027426719666},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4903578758239746},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.4263985753059387},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.42174625396728516},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3511528968811035}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7981915473937988},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7857683897018433},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7472981810569763},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.7334591150283813},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6311994194984436},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6125873923301697},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.6027911305427551},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5564643144607544},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5291027426719666},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4903578758239746},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.4263985753059387},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.42174625396728516},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3511528968811035},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itnac53136.2021.9652151","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itnac53136.2021.9652151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 31st International Telecommunication Networks and Applications Conference (ITNAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1678356000","https://openalex.org/W1966741850","https://openalex.org/W1987552279","https://openalex.org/W2040884411","https://openalex.org/W2099940443","https://openalex.org/W2105557138","https://openalex.org/W2106296294","https://openalex.org/W2143426320","https://openalex.org/W2150757437","https://openalex.org/W2157941646","https://openalex.org/W2167101736","https://openalex.org/W2295598076","https://openalex.org/W2296509296","https://openalex.org/W2512144135","https://openalex.org/W2546923044","https://openalex.org/W2606090416","https://openalex.org/W2748771977","https://openalex.org/W2793412195","https://openalex.org/W2887353807","https://openalex.org/W2926701059","https://openalex.org/W2972414240","https://openalex.org/W2996129306","https://openalex.org/W2998216295","https://openalex.org/W3106741970","https://openalex.org/W3112343206","https://openalex.org/W3133624139","https://openalex.org/W3177094233","https://openalex.org/W6743460167","https://openalex.org/W6753958210","https://openalex.org/W7066667914"],"related_works":["https://openalex.org/W4388745254","https://openalex.org/W2980082554","https://openalex.org/W2767419625","https://openalex.org/W2389704471","https://openalex.org/W1517228774","https://openalex.org/W4366990902","https://openalex.org/W2117019857","https://openalex.org/W4317732970","https://openalex.org/W4388550696","https://openalex.org/W4313289487"],"abstract_inverted_index":{"Cybersecurity":[0],"has":[1],"emerged":[2],"as":[3,128],"a":[4,15],"major":[5],"concern":[6],"for":[7,51],"individuals":[8],"and":[9,85,103,133,157,161],"organisations":[10],"due":[11],"to":[12,24,32,36,57],"digitalisation.":[13],"As":[14],"result,":[16],"data":[17],"is":[18,109],"growing":[19],"exponentially":[20],"making":[21],"it":[22],"susceptible":[23],"various":[25],"cyberattacks.":[26],"Intrusion":[27],"detection":[28],"systems":[29],"are":[30,41],"used":[31,90],"effectively":[33,141],"detect":[34],"cyberattacks":[35],"achieve":[37],"cybersecurity.":[38],"Traditionally,":[39],"there":[40],"many":[42],"existing":[43],"IDS":[44,63],"models":[45,120],"developed":[46],"using":[47,64,76,123],"machine":[48,66],"learning":[49,67],"algorithms":[50,68,78],"anomaly":[52],"detection.":[53],"This":[54],"study":[55],"aims":[56],"explore":[58],"the":[59,62,113,119,124,151],"performance":[60,117,125,153],"of":[61,118],"tree-based":[65],"with":[69,112,144,154],"feature":[70,92,146],"selection.":[71],"The":[72,107,116],"experiment":[73,108],"was":[74,121],"conducted":[75],"three":[77],"Decision":[79],"Tree":[80],"(DT),":[81],"Random":[82],"Forest":[83],"(RF),":[84],"XGBooster":[86],"(XGB).":[87],"Each":[88],"algorithm":[89],"five":[91],"selection":[93,147],"techniques":[94],"Information":[95],"Gain,":[96],"Pearson":[97,155],"Correlation,":[98],"Chi-square,":[99],"Principal":[100],"Component":[101],"Analysis,":[102],"Recursive":[104],"Feature":[105],"Elimination.":[106],"carried":[110],"out":[111],"NSL-KDD":[114],"dataset.":[115],"evaluated":[122],"metrics":[126],"such":[127],"accuracy,":[129],"recall,":[130],"precision,":[131],"F1-score,":[132],"false":[134],"positive":[135],"rate":[136],"(FPR).":[137],"Although":[138],"each":[139],"model":[140],"detects":[142],"intrusion":[143],"different":[145],"techniques,":[148],"DT":[149],"shows":[150],"highest":[152],"Correlation":[156],"achieved":[158],"82%":[159],"accuracy":[160],"0.02":[162],"FPR.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
