{"id":"https://openalex.org/W4213234840","doi":"https://doi.org/10.1142/s0219265921410322","title":"Intelligent Feature Subset Selection with Machine Learning Based Detection and Mitigation of DDoS Attacks in 5G Environment","display_name":"Intelligent Feature Subset Selection with Machine Learning Based Detection and Mitigation of DDoS Attacks in 5G Environment","publication_year":2022,"publication_date":"2022-02-14","ids":{"openalex":"https://openalex.org/W4213234840","doi":"https://doi.org/10.1142/s0219265921410322"},"language":"en","primary_location":{"id":"doi:10.1142/s0219265921410322","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410322","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040399210","display_name":"A. G. Nagesha","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"A. G. Nagesha","raw_affiliation_strings":["Department of ISE, Acharya Institute of Technology, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"Department of ISE, Acharya Institute of Technology, Bengaluru, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064266840","display_name":"Gadiraju Mahesh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Mahesh","raw_affiliation_strings":["Department of CSE, BMS Institute of Technology and Management, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, BMS Institute of Technology and Management, Bengaluru, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110225931","display_name":"Gowrishankar Gowrishankar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gowrishankar","raw_affiliation_strings":["Department of CSE, BMS College of Engineering, Bengaluru, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, BMS College of Engineering, Bengaluru, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040399210"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2761,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.53425524,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"22","issue":"Supp01","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.936330258846283},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8284743428230286},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6470632553100586},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5622304677963257},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.5010373592376709},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.472685843706131},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.46323081851005554},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.45267629623413086},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4387816786766052},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4114646315574646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38437017798423767},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3623683452606201},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.3383394479751587},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32879817485809326}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.936330258846283},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8284743428230286},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6470632553100586},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5622304677963257},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.5010373592376709},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.472685843706131},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46323081851005554},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.45267629623413086},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4387816786766052},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4114646315574646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38437017798423767},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3623683452606201},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.3383394479751587},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32879817485809326},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219265921410322","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265921410322","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1782464753","https://openalex.org/W2019030333","https://openalex.org/W2072788746","https://openalex.org/W2122032069","https://openalex.org/W2161632162","https://openalex.org/W2573353661","https://openalex.org/W2773104559","https://openalex.org/W2886733372","https://openalex.org/W2886954500","https://openalex.org/W2960059802","https://openalex.org/W2962819974","https://openalex.org/W2963917648","https://openalex.org/W2978572058","https://openalex.org/W2982682021","https://openalex.org/W3004079980","https://openalex.org/W3004307973","https://openalex.org/W3006912911","https://openalex.org/W3043302808","https://openalex.org/W3097179687","https://openalex.org/W3109975393","https://openalex.org/W3134578582","https://openalex.org/W4238811432","https://openalex.org/W4242735564","https://openalex.org/W4244917809","https://openalex.org/W4246652336","https://openalex.org/W4280612877"],"related_works":["https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W1968168724","https://openalex.org/W2204131204","https://openalex.org/W2001331025","https://openalex.org/W2754163055","https://openalex.org/W4256682929","https://openalex.org/W4322008378","https://openalex.org/W2383770723","https://openalex.org/W2097156747"],"abstract_inverted_index":{"The":[0,19,145,163],"fifth-generation":[1],"(5G)":[2],"technology":[3],"is":[4,24,184,203,230,248,286],"anticipated":[5],"to":[6,9,38,46,89,150,186,205,219,251,264],"permit":[7],"connectivity":[8,45],"billions":[10],"of":[11,16,22,60,63,68,116,157,191,261,279],"devices,":[12],"called":[13],"the":[14,57,73,99,108,113,142,155,181,194,198,210,221,225,274,280],"Internet":[15],"Things":[17],"(IoT).":[18],"primary":[20,58],"benefit":[21],"5G":[23,81,109,143],"that":[25],"it":[26],"has":[27],"maximum":[28],"bandwidth":[29],"and":[30,111,160,176],"can":[31,257],"drastically":[32],"expand":[33],"service":[34,41,69],"beyond":[35],"cell":[36],"phones":[37],"standard":[39],"internet":[40],"for":[42,80,137],"conventionally":[43],"fixed":[44],"homes,":[47],"offices,":[48],"factories,":[49],"etc.":[50],"But":[51],"IoT":[52],"devices":[53,106],"will":[54],"unavoidably":[55],"be":[56,258],"target":[59],"diverse":[61],"kinds":[62],"cyberattacks,":[64],"notably":[65],"distributed":[66],"denial":[67],"(DDoS)":[70],"attacks.":[71,118],"Since":[72],"conventional":[74],"DDoS":[75,117,139,152,207,276],"mitigation":[76],"techniques":[77,169],"are":[78,240],"ineffective":[79],"networks,":[82],"machine":[83],"learning":[84],"(ML)":[85],"approaches":[86],"find":[87],"helpful":[88],"accomplish":[90],"better":[91],"security.":[92],"With":[93],"this":[94,96],"motivation,":[95],"study":[97],"resolves":[98],"network":[100,105,133],"security":[101],"issues":[102],"posed":[103],"by":[104,267],"in":[107,141,224],"networks":[110],"mitigates":[112],"harmful":[114],"effects":[115],"This":[119],"paper":[120],"presents":[121],"a":[122,231,283],"new":[123],"pigeon-inspired":[124],"optimization-based":[125],"feature":[126,158,173],"selection":[127,159],"with":[128,154],"optimal":[129,189],"functional":[130],"link":[131],"neural":[132,237],"(FLNN),":[134],"PIOFS-OFLNN":[135,147,165],"model":[136,148,166,202,227],"mitigating":[138],"attacks":[140,153,208],"environment.":[144],"proposed":[146,164,281],"aims":[149],"detect":[151],"inclusion":[156],"classification":[161,201],"processes.":[162],"incorporates":[167],"different":[168],"such":[170],"as":[171],"pre-processing,":[172],"selection,":[174],"classification,":[175],"parameter":[177,215],"tuning.":[178],"In":[179],"addition,":[180],"PIOFS":[182],"algorithm":[183],"employed":[185],"choose":[187],"an":[188],"subset":[190],"features":[192],"from":[193],"pre-processed":[195],"data.":[196],"Besides,":[197],"OFLNN":[199],"based":[200],"applied":[204],"determine":[206],"where":[209],"Rat":[211],"Swarm":[212],"Optimizer":[213],"(RSO)":[214],"tuning":[216],"takes":[217],"place":[218],"adjust":[220],"parameters":[222],"involved":[223],"FLNN":[226,229],"optimally.":[228],"low":[232],"computational":[233],"interconnectivity":[234],"higher":[235],"cognitive":[236],"network.":[238],"There":[239],"still":[241],"no":[242],"hidden":[243],"layers.":[244],"FLNN\u2019s":[245],"input":[246],"vector":[247],"operationally":[249],"enlarged":[250],"produce":[252],"non-linear":[253],"remedies.":[254],"More":[255],"details":[256],"accessed":[259],"application":[260],"Nature-Inspired":[262],"Method":[263],"Odia":[265],"Written":[266],"hand":[268],"Number":[269],"system":[270],"Recognition.":[271],"To":[272],"validate":[273],"improved":[275],"detection":[277],"performance":[278],"model,":[282],"benchmark":[284],"dataset":[285],"used.":[287]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
