{"id":"https://openalex.org/W4411188874","doi":"https://doi.org/10.32604/cmc.2025.064930","title":"AI-Integrated Feature Selection of Intrusion Detection for Both SDN and Traditional Network Architectures Using an Improved Crayfish Optimization Algorithm","display_name":"AI-Integrated Feature Selection of Intrusion Detection for Both SDN and Traditional Network Architectures Using an Improved Crayfish Optimization Algorithm","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411188874","doi":"https://doi.org/10.32604/cmc.2025.064930"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064930","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064930","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064930","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100625645","display_name":"Hui Xu","orcid":"https://orcid.org/0000-0003-2081-555X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hui Xu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002978500","display_name":"Huang Wei","orcid":"https://orcid.org/0000-0002-9382-7212"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Huang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Longtan Bai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Longtan Bai","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100625645"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13225999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"84","issue":"2","first_page":"3053","last_page":"3073"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9509000182151794,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crayfish","display_name":"Crayfish","score":0.851239800453186},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7044824957847595},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.6840251684188843},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5910424590110779},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5249252915382385},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4923783540725708},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4338673949241638},{"id":"https://openalex.org/keywords/optimization-algorithm","display_name":"Optimization algorithm","score":0.4321228265762329},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.35290229320526123},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34125828742980957},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.12136727571487427},{"id":"https://openalex.org/keywords/fishery","display_name":"Fishery","score":0.10707011818885803},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0953114926815033},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.0844937264919281}],"concepts":[{"id":"https://openalex.org/C2781403440","wikidata":"https://www.wikidata.org/wiki/Q1211742","display_name":"Crayfish","level":2,"score":0.851239800453186},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7044824957847595},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.6840251684188843},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5910424590110779},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5249252915382385},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4923783540725708},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4338673949241638},{"id":"https://openalex.org/C2987595161","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Optimization algorithm","level":2,"score":0.4321228265762329},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35290229320526123},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34125828742980957},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.12136727571487427},{"id":"https://openalex.org/C505870484","wikidata":"https://www.wikidata.org/wiki/Q180538","display_name":"Fishery","level":1,"score":0.10707011818885803},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0953114926815033},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0844937264919281},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064930","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064930","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064930","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064930","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2111001247","https://openalex.org/W2170486501","https://openalex.org/W2282226143","https://openalex.org/W2764139274","https://openalex.org/W3005630930","https://openalex.org/W3084346886","https://openalex.org/W3092041085","https://openalex.org/W3094704314","https://openalex.org/W4213361588","https://openalex.org/W4251468493","https://openalex.org/W4308197883","https://openalex.org/W4386391043","https://openalex.org/W4386401373","https://openalex.org/W4390355635","https://openalex.org/W4395115917","https://openalex.org/W4399668886","https://openalex.org/W4400842580","https://openalex.org/W4400955963","https://openalex.org/W4402619887","https://openalex.org/W4406077156","https://openalex.org/W4406973210","https://openalex.org/W4407682393","https://openalex.org/W4408701898","https://openalex.org/W4409603439","https://openalex.org/W4409694721"],"related_works":["https://openalex.org/W2120912488","https://openalex.org/W2178149680","https://openalex.org/W2007122230","https://openalex.org/W2378265259","https://openalex.org/W2167757705","https://openalex.org/W2146749106","https://openalex.org/W2561452788","https://openalex.org/W2332791527","https://openalex.org/W4386564352","https://openalex.org/W2952668426"],"abstract_inverted_index":{"With":[0],"the":[1,15,37,42,51,57,72,75,121,124,128,135,144,148,157,169,187,210],"birth":[2],"of":[3,8,18,44,59,74,89,109,123,130,189],"Software-Defined":[4],"Networking":[5],"(SDN),":[6],"integration":[7],"both":[9,63,113,219],"SDN":[10,32,64,114,185,220],"and":[11,65,69,97,115,126,147,173,179,193,198,221],"traditional":[12,66,116,153,182,222],"architectures":[13],"becomes":[14],"development":[16],"trend":[17],"computer":[19],"networks.":[20,162,183],"Network":[21],"intrusion":[22,60,110,132,216],"detection":[23,61,111,217],"faces":[24],"challenges":[25],"in":[26,31,181],"dealing":[27],"with":[28,177],"complex":[29],"attacks":[30],"environments,":[33],"thus":[34],"to":[35,56,119],"address":[36],"network":[38,67,117,131,215],"security":[39],"issues":[40],"from":[41],"viewpoint":[43],"Artificial":[45],"Intelligence":[46],"(AI),":[47],"this":[48],"paper":[49],"introduces":[50],"Crayfish":[52,80],"Optimization":[53,81],"Algorithm":[54,82],"(COA)":[55],"field":[58],"for":[62,105,112,152,160,218],"architectures,":[68,118],"based":[70,208],"on":[71,209],"characteristics":[73],"original":[76],"COA,":[77],"an":[78],"Improved":[79],"(ICOA)":[83],"is":[84,102,138,191],"proposed":[85,211],"by":[86,140,171],"integrating":[87],"strategies":[88],"elite":[90],"reverse":[91],"learning,":[92],"Levy":[93],"flight,":[94],"crowding":[95],"factor":[96],"parameter":[98],"modification.":[99],"The":[100],"ICOA":[101,167,190,212],"then":[103],"utilized":[104],"AI-integrated":[106,205],"feature":[107,206],"selection":[108,207],"reduce":[120],"dimensionality":[122],"data":[125],"improve":[127],"performance":[129,136],"detection.":[133],"Finally,":[134],"evaluation":[137],"performed":[139],"testing":[141],"not":[142],"only":[143],"NSL-KDD":[145],"dataset":[146,151,159],"UNSW-NB":[149],"15":[150],"networks":[154],"but":[155],"also":[156],"InSDN":[158],"SDN-based":[161],"Experimental":[163],"results":[164],"show":[165],"that":[166,204],"improves":[168],"accuracy":[170,188],"0.532%":[172],"2.928%":[174],"respectively":[175],"compared":[176],"GWO":[178],"COA":[180,197],"In":[184],"networks,":[186],"0.25%":[192],"0.3%":[194],"higher":[195],"than":[196],"PSO.":[199],"These":[200],"findings":[201],"collectively":[202],"indicate":[203],"can":[213],"promote":[214],"architectures.":[223]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
