{"id":"https://openalex.org/W4321791293","doi":"https://doi.org/10.3233/jifs-222120","title":"An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network","display_name":"An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network","publication_year":2023,"publication_date":"2023-02-24","ids":{"openalex":"https://openalex.org/W4321791293","doi":"https://doi.org/10.3233/jifs-222120"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-222120","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-222120","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022780275","display_name":"S. Gokul Pran","orcid":"https://orcid.org/0000-0003-3863-1126"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"S. Gokul Pran","raw_affiliation_strings":["Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, Andhra Pradesh, India"],"raw_orcid":"https://orcid.org/0000-0003-3863-1126","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, Andhra Pradesh, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065886659","display_name":"Sivakami Raja","orcid":"https://orcid.org/0000-0002-6653-1117"},"institutions":[{"id":"https://openalex.org/I4399657946","display_name":"Rajalakshmi Engineering College","ror":"https://ror.org/01dw2vm55","country_code":null,"type":"education","lineage":["https://openalex.org/I4399657946"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sivakami Raja","raw_affiliation_strings":["Department of Computer Science and Engineering, Rajalakshmi Engineering College, Chennai, Tamil Nadu, India"],"raw_orcid":"https://orcid.org/0000-0002-6653-1117","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Rajalakshmi Engineering College, Chennai, Tamil Nadu, India","institution_ids":["https://openalex.org/I4399657946"]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5022780275"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1525,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78502616,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"44","issue":"5","first_page":"8561","last_page":"8571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7799860239028931},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7094627618789673},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.657920777797699},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.645104169845581},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5465320348739624},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.49916577339172363},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.49101758003234863},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.462912380695343},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.43067410588264465},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.4253443777561188},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.41238272190093994}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7799860239028931},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7094627618789673},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.657920777797699},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.645104169845581},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5465320348739624},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.49916577339172363},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.49101758003234863},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.462912380695343},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.43067410588264465},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.4253443777561188},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.41238272190093994}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-222120","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-222120","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1501531539","https://openalex.org/W2887897850","https://openalex.org/W2962727190","https://openalex.org/W3009422166","https://openalex.org/W3016266335","https://openalex.org/W3034541875","https://openalex.org/W3096966075","https://openalex.org/W3117488606","https://openalex.org/W3126814579","https://openalex.org/W3177389962","https://openalex.org/W3197357864","https://openalex.org/W3210846950","https://openalex.org/W4283019189","https://openalex.org/W4285227013","https://openalex.org/W4285731979","https://openalex.org/W4296420817","https://openalex.org/W4297538900","https://openalex.org/W4300167448","https://openalex.org/W4302424534","https://openalex.org/W4308422437","https://openalex.org/W6779538674","https://openalex.org/W6783495160","https://openalex.org/W6845947543"],"related_works":["https://openalex.org/W2989490741","https://openalex.org/W138569904","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W3092506759","https://openalex.org/W2390914021","https://openalex.org/W2389417819","https://openalex.org/W3195278891"],"abstract_inverted_index":{"Network":[0,53,249,254],"flaws":[1],"are":[2,84,92,123,151],"used":[3],"by":[4],"hackers":[5],"to":[6,9,94,125,128,153,192,270],"get":[7],"access":[8,18],"private":[10],"systems":[11],"and":[12,16,79,100,206,265],"data.":[13],"This":[14],"data":[15,77,164],"system":[17],"may":[19],"be":[20],"extremely":[21],"destructive":[22],"with":[23,55,107,142,185,211,242],"losses.":[24],"Therefore,":[25],"this":[26],"network":[27,63,157,182,197,260],"intrusions":[28,64],"detection":[29,65,262,274],"is":[30,60,104,135,183,202,209],"utmost":[31],"significance.":[32],"While":[33],"investigating":[34],"every":[35],"feature":[36,74,126,133],"set":[37],"in":[38,204],"the":[39,82,108,163,175],"network,":[40],"deep":[41,268],"learning-based":[42],"algorithms":[43],"require":[44],"certain":[45,212],"inputs.":[46],"That\u2019s":[47],"why,":[48],"an":[49],"Adaptive":[50],"Artificial":[51],"Neural":[52,248],"Optimized":[54],"Oppositional":[56,186],"Crow":[57,187],"Search":[58,188],"Algorithm":[59,189],"proposed":[61,68,200,226],"for":[62,117,159,253],"(IDS-AANN-OCSA).":[66],"The":[67,90,120,132,148,199,223],"method":[69],"includes":[70],"several":[71],"phases,":[72],"including":[73],"selection,":[75],"preprocessing,":[76],"acquisition,":[78],"classification.":[80],"Here,":[81],"datas":[83,91,122],"gathered":[85],"via":[86],"CICIDS":[87],"2017":[88],"dataset.":[89],"fed":[93,124,152],"pre-processing.":[95],"During":[96],"pre-processing,":[97],"redundancy":[98],"eradication":[99],"missing":[101],"value":[102],"replacement":[103],"carried":[105],"out":[106],"help":[109],"of":[110,178,196,225,267],"random":[111],"forest":[112],"along":[113],"Local":[114],"least":[115],"squares":[116],"removing":[118],"uncertainties.":[119],"pre-processed":[121],"selection":[127,134],"select":[129],"better":[130,194,229,235],"features.":[131],"accomplished":[136],"under":[137],"hybrid":[138],"genetic":[139],"algorithm":[140],"together":[141],"particle":[143],"swarm":[144],"optimization":[145],"technique":[146],"(GPSO).":[147],"selected":[149],"features":[150],"adaptive":[154,179],"artificial":[155,180],"neural":[156,181],"(AANN)":[158],"categorization":[160],"which":[161],"categorizes":[162],"as":[165],"BENIGN,":[166],"DOS":[167],"Hulk,":[168],"PortScan,":[169],"DDoS,":[170],"DoS":[171],"Golden":[172],"Eye.":[173],"Finally,":[174],"hyper":[176],"parameter":[177],"tuned":[184],"(OCSA)":[190],"helps":[191],"gain":[193],"classification":[195],"intrusions.":[198],"approach":[201,227],"activated":[203],"Python,":[205],"its":[207],"efficiency":[208],"evaluated":[210],"performance":[213,224],"metrics,":[214],"like":[215,245],"accuracy,":[216],"recall,":[217],"specificity,":[218],"precision,":[219],"F":[220],"score,":[221],"sensitivity.":[222],"achieves":[228],"accuracy":[230],"99.75%,":[231],"97.85%,":[232],"95.13%,":[233],"98.79,":[234],"sensitivity":[236],"96.34%,":[237],"91.23%,":[238],"89.12%,":[239],"87.25%,":[240],"compared":[241],"existing":[243],"methods,":[244],"One-Dimensional":[246],"Convolutional":[247],"Based":[250],"Deep":[251],"Learning":[252],"Intrusion":[255],"Detection":[256],"(IDS-CNN-GPSO),":[257],"An":[258],"innovative":[259],"intrusion":[261,273],"scheme":[263],"(IDS-CNN-LSTM)":[264],"Application":[266],"learning":[269],"real-time":[271],"Web":[272],"(IDS-CNN-ML-AIDS)":[275],"methods":[276],"respectively.":[277]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5}],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
