{"id":"https://openalex.org/W4292182382","doi":"https://doi.org/10.3233/jhs-220694","title":"Mutual clustered redundancy assisted feature selection for an intrusion detection\u00a0system","display_name":"Mutual clustered redundancy assisted feature selection for an intrusion detection\u00a0system","publication_year":2022,"publication_date":"2022-08-16","ids":{"openalex":"https://openalex.org/W4292182382","doi":"https://doi.org/10.3233/jhs-220694"},"language":"en","primary_location":{"id":"doi:10.3233/jhs-220694","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jhs-220694","pdf_url":null,"source":{"id":"https://openalex.org/S133922704","display_name":"Journal of High Speed Networks","issn_l":"0926-6801","issn":["0926-6801","1875-8940"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of High Speed Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067024205","display_name":"Thotakura Veeranna","orcid":"https://orcid.org/0000-0003-2248-4387"},"institutions":[{"id":"https://openalex.org/I142809039","display_name":"Jawaharlal Nehru Technological University, Kakinada","ror":"https://ror.org/05s9t8c95","country_code":"IN","type":"education","lineage":["https://openalex.org/I142809039"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"T. Veeranna","raw_affiliation_strings":["Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India","institution_ids":["https://openalex.org/I142809039"]}]},{"author_position":"last","author":{"id":null,"display_name":"Kiran Kumar Reddi","orcid":null},"institutions":[{"id":"https://openalex.org/I221092938","display_name":"Krishna University","ror":"https://ror.org/04yhntq62","country_code":"IN","type":"education","lineage":["https://openalex.org/I221092938"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kiran Kumar Reddi","raw_affiliation_strings":["Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India","institution_ids":["https://openalex.org/I221092938"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067024205"],"corresponding_institution_ids":["https://openalex.org/I142809039"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10379392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"4","first_page":"257","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8629961013793945},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7255198359489441},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6409686207771301},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6332950592041016},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6073950529098511},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5115422010421753},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.48225265741348267},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.46353602409362793},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.45144838094711304},{"id":"https://openalex.org/keywords/data-redundancy","display_name":"Data redundancy","score":0.4428781569004059}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8629961013793945},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7255198359489441},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6409686207771301},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6332950592041016},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6073950529098511},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5115422010421753},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.48225265741348267},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.46353602409362793},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45144838094711304},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.4428781569004059},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jhs-220694","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jhs-220694","pdf_url":null,"source":{"id":"https://openalex.org/S133922704","display_name":"Journal of High Speed Networks","issn_l":"0926-6801","issn":["0926-6801","1875-8940"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of High Speed Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1964718018","https://openalex.org/W1981565525","https://openalex.org/W1991147747","https://openalex.org/W1993913559","https://openalex.org/W1995450389","https://openalex.org/W2005175692","https://openalex.org/W2008224380","https://openalex.org/W2036825767","https://openalex.org/W2041077442","https://openalex.org/W2067211778","https://openalex.org/W2076384720","https://openalex.org/W2079535449","https://openalex.org/W2099940443","https://openalex.org/W2100495367","https://openalex.org/W2101109743","https://openalex.org/W2110106247","https://openalex.org/W2155926039","https://openalex.org/W2160721127","https://openalex.org/W2165835468","https://openalex.org/W2212753854","https://openalex.org/W2223600657","https://openalex.org/W2255500266","https://openalex.org/W2267339884","https://openalex.org/W2313003518","https://openalex.org/W2342992012","https://openalex.org/W2345461409","https://openalex.org/W2490447569","https://openalex.org/W2590371688","https://openalex.org/W2742479121","https://openalex.org/W2744498984","https://openalex.org/W2789654058","https://openalex.org/W2789828921","https://openalex.org/W2892245210","https://openalex.org/W2902529532","https://openalex.org/W2911171945","https://openalex.org/W2958285686","https://openalex.org/W2971935146","https://openalex.org/W2980576170","https://openalex.org/W3001565831","https://openalex.org/W3088647798","https://openalex.org/W4239777741","https://openalex.org/W4253806857","https://openalex.org/W4289236186","https://openalex.org/W6630226126","https://openalex.org/W6689058457","https://openalex.org/W6765992892"],"related_works":["https://openalex.org/W16836940","https://openalex.org/W2532741770","https://openalex.org/W2349373624","https://openalex.org/W3105251098","https://openalex.org/W2541519225","https://openalex.org/W2919868916","https://openalex.org/W2370807923","https://openalex.org/W2163070219","https://openalex.org/W2243180985","https://openalex.org/W2356310743"],"abstract_inverted_index":{"Intrusion":[0,28],"Detection":[1,29,182],"is":[2,46,112,120,132,147,179,192,206],"very":[3],"important":[4],"in":[5,44,60,68],"computer":[6],"networks":[7],"because":[8],"the":[9,14,41,47,98,115,123,127,137,144,150,177,199,202],"widespread":[10],"of":[11,49,110,130,154],"internet":[12],"makes":[13],"computers":[15],"more":[16],"prone":[17],"to":[18,113,121,133],"several":[19],"cyber-attacks.":[20],"With":[21],"this":[22,66,69],"inspiration,":[23],"a":[24,36,56,73],"new":[25],"paradigm":[26],"called":[27],"System":[30],"(IDS)":[31],"has":[32],"emerged":[33],"and":[34,51,82,93,104,118,135,152,172,176,186,201],"attained":[35],"huge":[37],"research":[38],"interest.":[39],"However,":[40],"major":[42],"challenge":[43],"IDS":[45,75],"presence":[48],"redundant":[50],"duplicate":[52,138,155],"information":[53],"that":[54],"causes":[55],"serious":[57],"computational":[58],"problem":[59],"network":[61],"traffic":[62,124,200],"classifications.":[63],"To":[64],"solve":[65],"problem,":[67],"paper,":[70],"we":[71],"propose":[72],"novel":[74],"model":[76],"based":[77],"on":[78,194],"statistical":[79,99],"processing":[80,100],"techniques":[81,101],"machine":[83,87],"learning":[84,88],"algorithms.":[85],"The":[86,107],"algorithms":[89],"incudes":[90],"Fuzzy":[91],"C-means":[92],"Support":[94],"Vector":[95],"Machine":[96],"while":[97,143],"includes":[102],"correlation":[103,131],"Joint":[105,145],"Entropy.":[106],"main":[108,128],"purpose":[109,129],"FCM":[111],"cluster":[114,142],"train":[116],"data":[117],"SVM":[119],"classify":[122],"connections.":[125],"Next,":[126],"discover":[134],"remove":[136],"connections":[139],"from":[140,157],"every":[141,158,195],"entropy":[146],"applied":[148],"for":[149],"discovery":[151],"removal":[153],"features":[156],"connection.":[159],"For":[160],"experimental":[161],"validation,":[162],"totally":[163],"three":[164],"standard":[165],"datasets":[166],"namely":[167],"KDD":[168],"Cup":[169],"99,":[170],"NSL-KDD":[171],"Kyoto2006+":[173],"are":[174],"considered":[175],"performance":[178,205],"measured":[180],"through":[181],"Rate,":[183],"Precision,":[184],"F-Score,":[185],"accuracy.":[187],"A":[188],"five-fold":[189],"cross":[190],"validation":[191],"done":[193],"dataset":[196],"by":[197],"changing":[198],"obtained":[203],"average":[204],"compared":[207],"with":[208],"existing":[209],"methods.":[210]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
