{"id":"https://openalex.org/W4414070469","doi":"https://doi.org/10.32604/cmc.2025.065885","title":"Optimizing Network Intrusion Detection Performance with GNN-Based Feature Selection","display_name":"Optimizing Network Intrusion Detection Performance with GNN-Based Feature Selection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414070469","doi":"https://doi.org/10.32604/cmc.2025.065885"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065885","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065885","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065885","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021585332","display_name":"Hoon Ko","orcid":"https://orcid.org/0000-0002-4604-1735"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hoon Ko","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081181492","display_name":"Marek R. Ogiela","orcid":"https://orcid.org/0000-0002-8298-8627"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marek R. Ogiela","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017235164","display_name":"Libor M\u011bs\u00ed\u010dek","orcid":"https://orcid.org/0000-0002-7795-0261"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Libor Mesicek","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5101931762","display_name":"Sang\u2010Heon Kim","orcid":"https://orcid.org/0000-0002-6128-8218"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sangheon Kim","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021585332"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29008038,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"2","first_page":"2985","last_page":"2997"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8409000039100647},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.7556999921798706},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.741100013256073},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6229000091552734},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5411999821662903},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.48809999227523804},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4440999925136566},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.4115000069141388}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8409000039100647},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.7556999921798706},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7459999918937683},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.741100013256073},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6229000091552734},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5893999934196472},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5748999714851379},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5519000291824341},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5411999821662903},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.48809999227523804},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4440999925136566},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.4115000069141388},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38989999890327454},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.3562999963760376},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.3443000018596649},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3402000069618225},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.27720001339912415},{"id":"https://openalex.org/C34947359","wikidata":"https://www.wikidata.org/wiki/Q665189","display_name":"Complex network","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065885","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065885","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065885","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065885","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2558748708","https://openalex.org/W2907492528","https://openalex.org/W3032284425","https://openalex.org/W3106741970","https://openalex.org/W3185244527","https://openalex.org/W3206604724","https://openalex.org/W3212868562","https://openalex.org/W4285146274","https://openalex.org/W4307042912","https://openalex.org/W4376480418","https://openalex.org/W4379382413","https://openalex.org/W4386010339","https://openalex.org/W4388579604","https://openalex.org/W4389781647","https://openalex.org/W4392120324","https://openalex.org/W4399802427","https://openalex.org/W4405865604"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2906422846","https://openalex.org/W2390009783","https://openalex.org/W2364419519","https://openalex.org/W2133389611","https://openalex.org/W2360767377","https://openalex.org/W2017948608","https://openalex.org/W2360951146"],"abstract_inverted_index":{"The":[0,110],"rapid":[1],"evolution":[2],"of":[3,106,115],"AI-driven":[4],"cybersecurity":[5],"solutions":[6],"has":[7],"led":[8],"to":[9,20,89,101,103],"increasingly":[10],"complex":[11],"network":[12],"infrastructures,":[13],"which":[14],"in":[15,80,123],"turn":[16],"increases":[17],"their":[18,48],"exposure":[19],"sophisticated":[21],"threats.":[22,109],"This":[23],"study":[24],"proposes":[25],"a":[26,98],"Graph":[27],"Neural":[28],"Network":[29,37],"(GNN)-based":[30],"feature":[31,44,57],"selection":[32],"strategy":[33],"specifically":[34],"tailored":[35],"for":[36,118],"Intrusion":[38],"Detection":[39],"Systems":[40],"(NIDS).":[41],"By":[42],"modeling":[43],"correlations":[45],"and":[46,59,84,132,136,146],"leveraging":[47],"topological":[49],"relationships,":[50],"this":[51],"method":[52],"addresses":[53],"challenges":[54],"such":[55],"as":[56],"redundancy":[58],"class":[60,86],"imbalance.":[61],"Experimental":[62],"analysis":[63],"using":[64],"the":[65,70,94,104,113,143],"KDDTest+":[66],"dataset":[67],"demonstrates":[68],"that":[69],"proposed":[71],"model":[72],"achieves":[73],"98.5%":[74],"detection":[75,122],"accuracy,":[76],"showing":[77],"notable":[78],"gains":[79],"both":[81],"computational":[82],"efficiency":[83],"minority":[85],"detection.":[87],"Compared":[88],"conventional":[90],"machine":[91],"learning":[92],"methods,":[93],"GNN-based":[95],"approach":[96],"exhibits":[97],"superior":[99],"capability":[100],"adapt":[102],"dynamics":[105],"evolving":[107],"cyber":[108],"findings":[111],"support":[112],"feasibility":[114],"deploying":[116],"GNNs":[117],"scalable,":[119],"real-time":[120],"anomaly":[121],"modern":[124],"networks.":[125],"Furthermore,":[126],"key":[127],"predictive":[128],"features,":[129],"notably":[130],"f35":[131],"f23,":[133],"are":[134],"identified":[135],"validated":[137],"through":[138],"correlation":[139],"analysis,":[140],"thereby":[141],"enhancing":[142],"model\u2019s":[144],"interpretability":[145],"effectiveness.":[147]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
