{"id":"https://openalex.org/W4416799289","doi":"https://doi.org/10.1109/snpd65828.2025.11253024","title":"Improving the efficiency of attack detection in cellular networks through the combination of statistical feature selection methods and machine learning algorithms","display_name":"Improving the efficiency of attack detection in cellular networks through the combination of statistical feature selection methods and machine learning algorithms","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4416799289","doi":"https://doi.org/10.1109/snpd65828.2025.11253024"},"language":null,"primary_location":{"id":"doi:10.1109/snpd65828.2025.11253024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11253024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120482207","display_name":"Dina Satybaldin","orcid":null},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":true,"raw_author_name":"Dina Satybaldin","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security and Cryptology Research Institute,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security and Cryptology Research Institute,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5096678661","display_name":"Nazerke Bisenbaeva","orcid":null},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Nazerke Bisenbaeva","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Computer Engineering and Software Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Computer Engineering and Software Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038537113","display_name":"Aliya Issainova","orcid":"https://orcid.org/0000-0001-8008-4096"},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Aliya Issainova","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029571043","display_name":"Yerzhan Seitkulov","orcid":"https://orcid.org/0000-0002-5172-8339"},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Yerzhan Seitkulov","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094236317","display_name":"Tolegen Aidynov","orcid":"https://orcid.org/0009-0005-3327-9719"},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Tolegen Aidynov","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5115648231","display_name":"Mamyr Altaibek","orcid":"https://orcid.org/0009-0002-8219-0751"},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Mamyr Altaibek","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5120482207"],"corresponding_institution_ids":["https://openalex.org/I10232997"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44598874,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"111","last_page":"116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5453000068664551,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5453000068664551,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.13429999351501465,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13038","display_name":"Internet of Things and AI","score":0.0215000007301569,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7599999904632568},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6848999857902527},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.597599983215332},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5583999752998352},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5259000062942505},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41370001435279846},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4041999876499176},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.38519999384880066},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.3741999864578247}],"concepts":[{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7599999904632568},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7585999965667725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7217000126838684},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7006999850273132},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6848999857902527},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.597599983215332},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5583999752998352},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5259000062942505},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41370001435279846},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4041999876499176},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39010000228881836},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.38519999384880066},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.36419999599456787},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.352400004863739},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33820000290870667},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.3280999958515167},{"id":"https://openalex.org/C2982736386","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Statistical learning","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C133972139","wikidata":"https://www.wikidata.org/wiki/Q5058371","display_name":"Cellular traffic","level":3,"score":0.296099990606308},{"id":"https://openalex.org/C115903097","wikidata":"https://www.wikidata.org/wiki/Q7094097","display_name":"Online machine learning","level":3,"score":0.2955999970436096},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.26460000872612},{"id":"https://openalex.org/C2779915298","wikidata":"https://www.wikidata.org/wiki/Q7604400","display_name":"Statistical learning theory","level":3,"score":0.2540000081062317},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snpd65828.2025.11253024","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11253024","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2296509296","https://openalex.org/W2777591511","https://openalex.org/W2997751246","https://openalex.org/W3082263548","https://openalex.org/W3085955590","https://openalex.org/W3108671495","https://openalex.org/W3119693685","https://openalex.org/W3126814579","https://openalex.org/W3133908927","https://openalex.org/W3135709051","https://openalex.org/W3169515268","https://openalex.org/W4282836908","https://openalex.org/W4283362374","https://openalex.org/W4289529061","https://openalex.org/W4297152848","https://openalex.org/W4311906436","https://openalex.org/W4313408599","https://openalex.org/W4315783030","https://openalex.org/W4384345357","https://openalex.org/W4385429522"],"related_works":[],"abstract_inverted_index":{"The":[0,18,136,163],"goal":[1],"of":[2,11,28,31,49,55,64,91,123,130,143,170],"this":[3],"paper":[4],"is":[5],"to":[6,73,85],"improve":[7],"the":[8,21,75,80,87,96,121,128,140,153,167,171],"detection":[9,184],"efficiency":[10],"Denial-of-Service":[12],"(DoS)":[13],"attacks":[14],"in":[15,156],"cellular":[16,188],"networks.":[17,189],"study":[19],"uses":[20],"TON_IoT":[22],"dataset,":[23],"which":[24,151],"has":[25],"a":[26,38,61],"lot":[27],"different":[29],"kinds":[30],"data,":[32],"such":[33],"as":[34],"network":[35,92],"traffic":[36,93,117],"from":[37,47],"realistic":[39],"medium-scale":[40],"network,":[41],"operating":[42],"system":[43],"logs,":[44],"and":[45,52,69,111,127,147,160,174,186],"telemetry":[46],"Internet":[48,54],"Things":[50,56],"(IoT)":[51],"Industrial":[53],"(IIoT)":[57],"services.":[58],"We":[59,78,100,119],"conducted":[60],"comprehensive":[62],"analysis":[63],"various":[65],"feature":[66,82,144],"selection":[67,83,145],"methods":[68],"machine":[70,103,148],"learning":[71,104,149],"models":[72],"achieve":[74],"research":[76],"objectives.":[77],"applied":[79],"statistical":[81],"method":[84,146],"identify":[86],"most":[88],"informative":[89],"characteristics":[90],"associated":[94],"with":[95],"selected":[97],"attack":[98],"type.":[99],"employed":[101],"multiple":[102],"algorithms,":[105],"including":[106],"random":[107],"forest,":[108],"logistic":[109],"regression,":[110],"support":[112],"vector":[113],"machines":[114],"(SVM),":[115],"for":[116,179],"classification.":[118],"analyzed":[120],"impact":[122],"training":[124],"dataset":[125],"size":[126],"significance":[129],"individual":[131],"features":[132],"on":[133],"classification":[134],"accuracy.":[135],"experimental":[137],"evaluation":[138],"identified":[139],"optimal":[141],"combination":[142],"model,":[150],"provided":[152],"highest":[154],"accuracy":[155],"detecting":[157],"both":[158],"DoS":[159],"DDoS":[161],"attacks.":[162],"obtained":[164],"results":[165],"demonstrate":[166],"high":[168],"effectiveness":[169],"proposed":[172],"approach":[173],"open":[175],"up":[176],"new":[177],"possibilities":[178],"developing":[180],"more":[181],"robust":[182],"intrusion":[183],"systems":[185],"protecting":[187]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-28T00:00:00"}
