{"id":"https://openalex.org/W3035965493","doi":"https://doi.org/10.1145/3391812.3396274","title":"Feature Selection Improves Tree-based Classification for Wireless Intrusion Detection","display_name":"Feature Selection Improves Tree-based Classification for Wireless Intrusion Detection","publication_year":2020,"publication_date":"2020-06-16","ids":{"openalex":"https://openalex.org/W3035965493","doi":"https://doi.org/10.1145/3391812.3396274","mag":"3035965493"},"language":"en","primary_location":{"id":"doi:10.1145/3391812.3396274","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3391812.3396274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085308768","display_name":"Shilpa Bhandari","orcid":"https://orcid.org/0000-0002-9437-3996"},"institutions":[{"id":"https://openalex.org/I161203489","display_name":"Youngstown State University","ror":"https://ror.org/038zf2n28","country_code":"US","type":"education","lineage":["https://openalex.org/I161203489"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shilpa Bhandari","raw_affiliation_strings":["Youngstown State University, Youngstown, OH, USA"],"affiliations":[{"raw_affiliation_string":"Youngstown State University, Youngstown, OH, USA","institution_ids":["https://openalex.org/I161203489"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072307805","display_name":"Avinash K. Kukreja","orcid":null},"institutions":[{"id":"https://openalex.org/I161203489","display_name":"Youngstown State University","ror":"https://ror.org/038zf2n28","country_code":"US","type":"education","lineage":["https://openalex.org/I161203489"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Avinash K. Kukreja","raw_affiliation_strings":["Youngstown State University, Youngstown, OH, USA"],"affiliations":[{"raw_affiliation_string":"Youngstown State University, Youngstown, OH, USA","institution_ids":["https://openalex.org/I161203489"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056799505","display_name":"Alina Lazar","orcid":"https://orcid.org/0000-0002-2096-1541"},"institutions":[{"id":"https://openalex.org/I161203489","display_name":"Youngstown State University","ror":"https://ror.org/038zf2n28","country_code":"US","type":"education","lineage":["https://openalex.org/I161203489"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alina Lazar","raw_affiliation_strings":["Youngstown State University, Youngstown, OH, USA"],"affiliations":[{"raw_affiliation_string":"Youngstown State University, Youngstown, OH, USA","institution_ids":["https://openalex.org/I161203489"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068293431","display_name":"Alex Sim","orcid":"https://orcid.org/0000-0002-6295-1982"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alex Sim","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA","institution_ids":["https://openalex.org/I148283060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043129695","display_name":"Kesheng Wu","orcid":"https://orcid.org/0000-0002-6907-3393"},"institutions":[{"id":"https://openalex.org/I148283060","display_name":"Lawrence Berkeley National Laboratory","ror":"https://ror.org/02jbv0t02","country_code":"US","type":"facility","lineage":["https://openalex.org/I1330989302","https://openalex.org/I148283060","https://openalex.org/I39565521"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kesheng Wu","raw_affiliation_strings":["Lawrence Berkeley National Laboratory, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"Lawrence Berkeley National Laboratory, Berkeley, CA, USA","institution_ids":["https://openalex.org/I148283060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5085308768"],"corresponding_institution_ids":["https://openalex.org/I161203489"],"apc_list":null,"apc_paid":null,"fwci":2.2656,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.88781329,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9735999703407288,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8264783620834351},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7481483817100525},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6441651582717896},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.6007747054100037},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.586021363735199},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5430956482887268},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5271682143211365},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5197941064834595},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5157347321510315},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.48530954122543335},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.48111170530319214},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.46938177943229675},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45199328660964966},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.4249922037124634},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4183889627456665},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4108269214630127},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1125967800617218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09302321076393127}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8264783620834351},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7481483817100525},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6441651582717896},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.6007747054100037},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.586021363735199},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5430956482887268},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5271682143211365},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5197941064834595},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5157347321510315},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.48530954122543335},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.48111170530319214},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.46938177943229675},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45199328660964966},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.4249922037124634},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4183889627456665},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4108269214630127},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1125967800617218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09302321076393127},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3391812.3396274","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3391812.3396274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics","raw_type":"proceedings-article"},{"id":"pmh:oai:escholarship.org/ark:/13030/qt2x267152","is_oa":false,"landing_page_url":"https://escholarship.org/uc/item/2x267152","pdf_url":null,"source":{"id":"https://openalex.org/S4306400115","display_name":"eScholarship (California Digital Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2801248553","host_organization_name":"California Digital Library","host_organization_lineage":["https://openalex.org/I2801248553"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W273955616","https://openalex.org/W1569133926","https://openalex.org/W2028070713","https://openalex.org/W2056132907","https://openalex.org/W2137273017","https://openalex.org/W2295598076","https://openalex.org/W2576897537","https://openalex.org/W2590373591","https://openalex.org/W2612398564","https://openalex.org/W2763978449","https://openalex.org/W2768348081","https://openalex.org/W2782735691","https://openalex.org/W2783741806","https://openalex.org/W2792146927","https://openalex.org/W2911964244","https://openalex.org/W2912933002","https://openalex.org/W2939745396","https://openalex.org/W2941260055","https://openalex.org/W2944675392","https://openalex.org/W2949199409","https://openalex.org/W2955040443","https://openalex.org/W2994950844","https://openalex.org/W2999615587","https://openalex.org/W3002518139","https://openalex.org/W3004777721","https://openalex.org/W3006677386","https://openalex.org/W3008260888","https://openalex.org/W3010424895","https://openalex.org/W3010490819","https://openalex.org/W3019994165","https://openalex.org/W3102476541","https://openalex.org/W3215546899","https://openalex.org/W4234793475","https://openalex.org/W4238496971","https://openalex.org/W4241043909"],"related_works":["https://openalex.org/W2122022187","https://openalex.org/W2115529843","https://openalex.org/W4205206396","https://openalex.org/W1618196697","https://openalex.org/W2965693718","https://openalex.org/W3048286013","https://openalex.org/W2155850863","https://openalex.org/W4210628983","https://openalex.org/W2368866852","https://openalex.org/W2623725391"],"abstract_inverted_index":{"With":[0,159],"the":[1,26,44,68,91,100,104,119,131,149,155,165,181,194,198,210,214,233,239],"growth":[2],"of":[3,43,114,148,163,176,196,221],"5G":[4],"wireless":[5],"technologies":[6],"and":[7,37,85,94,125,226,238],"IoT,":[8],"it":[9,127],"become":[10],"urgent":[11],"to":[12,24,33,58,82,89,136,184,203],"develop":[13],"robust":[14],"network":[15],"security":[16],"systems,":[17],"such":[18],"as":[19,171,173],"intrusions":[20],"detection":[21],"systems":[22,31],"(IDS)":[23],"keep":[25],"networks":[27],"secure.":[28],"These":[29],"IDS":[30,46],"need":[32],"detect":[34],"unauthorized":[35],"access":[36],"attacks":[38],"in":[39,73,111],"real-time.":[40],"However,":[41],"most":[42],"modern":[45],"are":[47,56,201],"built":[48],"based":[49],"on":[50,205],"complex":[51],"machine":[52],"learning":[53],"models":[54],"that":[55,130,142,191,208],"time-consuming":[57],"train.":[59],"In":[60],"this":[61,160],"work,":[62],"we":[63,143],"propose":[64],"a":[65,112,174,218],"methodology":[66],"using":[67],"SHapley":[69],"Additive":[70],"exPlanations":[71],"(SHAP)":[72],"combination":[74],"with":[75,103],"tree-based":[76],"classifiers.":[77],"SHAP":[78,229],"can":[79,144],"be":[80,137,169],"used":[81],"select":[83],"consistent":[84],"small":[86],"feature":[87,151],"subsets":[88],"reduce":[90],"execution":[92],"time":[93,167],"improve":[95],"classification":[96,116,199,240],"accuracy.":[97,158],"We":[98],"demonstrate":[99],"proposed":[101],"approach":[102],"Aegean":[105],"Wi-Fi":[106],"Intrusion":[107],"Dataset":[108],"(AWID)":[109],"dataset":[110],"series":[113],"multi-class":[115],"experiments.":[117],"Among":[118],"four":[120],"classes":[121,212],"(\"normal\",":[122],"\"injection\",":[123],"\"flooding\"":[124],"\"impersonation\"),":[126],"is":[128,134],"well-known":[129],"class":[132],"impersonation":[133,186],"hard":[135],"classified":[138],"accurately.":[139],"Tests":[140],"show":[141],"use":[145],"about":[146],"10%":[147],"initial":[150],"set":[152,162],"without":[153],"reducing":[154,193],"overall":[156],"prediction":[157],"reduced":[161,170],"features,":[164,197],"training":[166],"could":[168],"much":[172],"factor":[175],"four,":[177],"while":[178],"slightly":[179],"improving":[180],"discriminating":[182],"ability":[183],"identify":[185],"instances.":[187],"This":[188],"study":[189],"suggests":[190],"by":[192],"number":[195],"algorithms":[200],"able":[202],"focus":[204],"key":[206],"trends":[207],"differentiates":[209],"\"attacks\"":[211],"from":[213],"\"normal\"":[215],"class.":[216],"Using":[217],"reduces":[219],"subset":[220],"features":[222,237],"improves":[223],"IDS's":[224],"accuracy":[225],"performance.":[227],"Also,":[228],"dependence":[230],"plots":[231],"capture":[232],"relationship":[234],"between":[235],"individual":[236],"decision.":[241]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
