{"id":"https://openalex.org/W7136980368","doi":"https://doi.org/10.1109/ants66931.2025.11430108","title":"FIDS: Accelerating Network Intrusion Detection Through Strategic Feature Selection","display_name":"FIDS: Accelerating Network Intrusion Detection Through Strategic Feature Selection","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7136980368","doi":"https://doi.org/10.1109/ants66931.2025.11430108"},"language":null,"primary_location":{"id":"doi:10.1109/ants66931.2025.11430108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants66931.2025.11430108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129492556","display_name":"James Elmore","orcid":null},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James Elmore","raw_affiliation_strings":["William &#x0026; Mary,Department of Mathematics,Williamsburg,VA,USA"],"affiliations":[{"raw_affiliation_string":"William &#x0026; Mary,Department of Mathematics,Williamsburg,VA,USA","institution_ids":["https://openalex.org/I16285277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073099492","display_name":"Ayan Roy","orcid":"https://orcid.org/0000-0001-6504-1055"},"institutions":[{"id":"https://openalex.org/I177308816","display_name":"Christopher Newport University","ror":"https://ror.org/00m4rwq02","country_code":"US","type":"education","lineage":["https://openalex.org/I177308816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ayan Roy","raw_affiliation_strings":["Christopher Newport University,Computer Science, and Engineering,Department of Physics,Newport News,VA,USA"],"affiliations":[{"raw_affiliation_string":"Christopher Newport University,Computer Science, and Engineering,Department of Physics,Newport News,VA,USA","institution_ids":["https://openalex.org/I177308816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5129492556"],"corresponding_institution_ids":["https://openalex.org/I16285277"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79043696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.723800003528595,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.723800003528595,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.0421999990940094,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.033399999141693115,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5303999781608582},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5052000284194946},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.49799999594688416},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.46470001339912415},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.31130000948905945},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.30880001187324524}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6191999912261963},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5303999781608582},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5052000284194946},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.49799999594688416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.476500004529953},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.46470001339912415},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3873000144958496},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.30720001459121704},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.29330000281333923},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.25040000677108765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants66931.2025.11430108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants66931.2025.11430108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.6608563661575317,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1514281731","https://openalex.org/W2101234009","https://openalex.org/W2127314075","https://openalex.org/W2789828921","https://openalex.org/W2911964244","https://openalex.org/W3010220852","https://openalex.org/W3016845520","https://openalex.org/W3021973688","https://openalex.org/W3042433202","https://openalex.org/W3195196909","https://openalex.org/W3196223475","https://openalex.org/W4206709449","https://openalex.org/W4318052012","https://openalex.org/W4322502180","https://openalex.org/W4378906691","https://openalex.org/W4388110891","https://openalex.org/W4394006101","https://openalex.org/W4406754164"],"related_works":[],"abstract_inverted_index":{"Network":[0],"intrusion":[1],"detection":[2,23,63],"systems":[3],"(IDS)":[4],"typically":[5],"analyze":[6],"complete":[7],"network":[8,47],"flows":[9,15],"to":[10,16,134],"identify":[11],"malicious":[12],"traffic,":[13],"requiring":[14],"conclude":[17],"before":[18],"classification.":[19],"This":[20,39,144],"approach":[21,44,145],"creates":[22],"delays":[24],"for":[25,34,121,157],"attacks":[26],"like":[27],"Slowloris":[28,159],"that":[29,45],"intentionally":[30],"keep":[31],"connections":[32],"open":[33],"extended":[35],"periods":[36],"of":[37,58,81,107,169],"time.":[38],"paper":[40],"introduces":[41],"a":[42,59,108,111,164,174],"novel":[43],"classifies":[46],"traffic":[48],"using":[49,78,114,137],"only":[50],"features":[51,88,100,116],"available":[52,89,117],"from":[53,90,102],"the":[54,75,83,91,95,103,119],"first":[55,92,104],"few":[56,105],"packets":[57,106],"flow,":[60,109],"enabling":[61,140],"faster":[62,142],"while":[64],"maintaining":[65],"high":[66],"accuracy.":[67],"We":[68],"evaluate":[69],"three":[70],"random":[71],"forest":[72],"models":[73],"on":[74,87],"CICIDS2017":[76],"dataset":[77,120],"expanding":[79],"sets":[80],"features:":[82],"first-packet":[84],"model":[85,97,113,125,172],"trained":[86],"backward":[93],"packet,":[94],"few-packet":[96,124],"which":[98],"includes":[99],"estimable":[101],"and":[110,131,160],"full-flow":[112,138],"all":[115],"in":[118],"reference.":[122],"Our":[123],"achieves":[126],"99.64%":[127,132],"accuracy,":[128],"99.80%":[129],"precision,":[130],"recall-comparable":[133],"state-of-the-art":[135],"approaches":[136],"information-while":[139],"significantly":[141],"detection.":[143],"is":[146],"effective":[147],"against":[148],"slow-rate":[149],"DoS":[150],"attacks,":[151],"achieving":[152],"over":[153],"99%":[154],"F1":[155],"scores":[156],"both":[158],"slowhttptest":[161],"traffic.":[162],"At":[163],"low":[165],"false":[166],"positive":[167,177],"rate":[168],"0.01%,":[170],"our":[171],"maintains":[173],"99.17%":[175],"true":[176],"rate.":[178]},"counts_by_year":[],"updated_date":"2026-03-18T06:27:02.140700","created_date":"2026-03-17T00:00:00"}
