{"id":"https://openalex.org/W2136800270","doi":"https://doi.org/10.5539/cis.v3n4p80","title":"ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection","display_name":"ID-SOMGA: A Self Organising Migrating Genetic Algorithm-Based Solution for Intrusion Detection","publication_year":2010,"publication_date":"2010-10-20","ids":{"openalex":"https://openalex.org/W2136800270","doi":"https://doi.org/10.5539/cis.v3n4p80","mag":"2136800270"},"language":"en","primary_location":{"id":"doi:10.5539/cis.v3n4p80","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p80","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/6768/6116","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ccsenet.org/journal/index.php/cis/article/download/6768/6116","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083571530","display_name":"Olusegun Folorunso","orcid":"https://orcid.org/0000-0002-9897-7375"},"institutions":[{"id":"https://openalex.org/I18045400","display_name":"Federal University of Agriculture","ror":"https://ror.org/050s1zm26","country_code":"NG","type":"education","lineage":["https://openalex.org/I18045400"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Olusegun Folorunso","raw_affiliation_strings":["(Department of Computer Science, University of Agriculture, Abeokuta, Nigeria)"],"affiliations":[{"raw_affiliation_string":"(Department of Computer Science, University of Agriculture, Abeokuta, Nigeria)","institution_ids":["https://openalex.org/I18045400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047756786","display_name":"Oluwatobi O. Akande","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Oluwatobi O. Akande","raw_affiliation_strings":["Department of Computer Science, University of Agriculture"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Agriculture","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059489339","display_name":"Adewale Opeoluwa Ogunde","orcid":"https://orcid.org/0000-0002-7913-3281"},"institutions":[{"id":"https://openalex.org/I265584191","display_name":"Redeemer's University","ror":"https://ror.org/01v0we819","country_code":"NG","type":"education","lineage":["https://openalex.org/I265584191"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Adewale O. Ogunde","raw_affiliation_strings":["Department of Mathematical Sciences, Redeemer\u2019s University"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, Redeemer\u2019s University","institution_ids":["https://openalex.org/I265584191"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089029259","display_name":"Olufunke Rebecca Vincent","orcid":"https://orcid.org/0000-0002-6196-4183"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Olufunke R. Vincent","raw_affiliation_strings":["Department of Computer Science, University of Agriculture"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Agriculture","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083571530"],"corresponding_institution_ids":["https://openalex.org/I18045400"],"apc_list":null,"apc_paid":null,"fwci":1.507,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.84492752,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.9293847680091858},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8648146390914917},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.8181453943252563},{"id":"https://openalex.org/keywords/anomaly-based-intrusion-detection-system","display_name":"Anomaly-based intrusion detection system","score":0.7058828473091125},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.6566064357757568},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4947482943534851},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4916742444038391},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.47906145453453064},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.4436679780483246},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44014447927474976},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2837362289428711},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2506977617740631},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.13115668296813965}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.9293847680091858},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8648146390914917},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.8181453943252563},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.7058828473091125},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.6566064357757568},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4947482943534851},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4916742444038391},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.47906145453453064},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.4436679780483246},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44014447927474976},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2837362289428711},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2506977617740631},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.13115668296813965}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/cis.v3n4p80","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p80","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/6768/6116","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/cis.v3n4p80","is_oa":true,"landing_page_url":"https://doi.org/10.5539/cis.v3n4p80","pdf_url":"https://ccsenet.org/journal/index.php/cis/article/download/6768/6116","source":{"id":"https://openalex.org/S2764452479","display_name":"Computer and Information Science","issn_l":"1913-8989","issn":["1913-8989","1913-8997"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Information Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.44999998807907104},{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2136800270.pdf","grobid_xml":"https://content.openalex.org/works/W2136800270.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W1508288884","https://openalex.org/W2035175061","https://openalex.org/W2047094503","https://openalex.org/W2067361528","https://openalex.org/W2117646649","https://openalex.org/W2167990608","https://openalex.org/W2514291601","https://openalex.org/W2802348331","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2184360008","https://openalex.org/W3148526535","https://openalex.org/W2188427116","https://openalex.org/W2368379890","https://openalex.org/W2183313954","https://openalex.org/W2209997499","https://openalex.org/W1585406410","https://openalex.org/W2148459958","https://openalex.org/W2061466315","https://openalex.org/W1485296229"],"abstract_inverted_index":{"The":[0,152,224],"study":[1,100],"examined":[2],"the":[3,19,44,120,127,130,135,142,167,198,221,231],"detection":[4,29,47,70,87,95,110,185],"of":[5,21,43,129,134,149,166,173,184,233,244],"attacks":[6,57],"against":[7],"computer":[8],"networks,":[9],"which":[10],"is":[11,31],"becoming":[12],"a":[13,91],"harder":[14],"problem":[15,25],"to":[16,68,72,89,106,119,140,146,190,215],"solve":[17],"in":[18,123,144,201,220,235],"field":[20],"Network":[22],"security.":[23],"A":[24],"with":[26,171,176,196,208],"current":[27],"intrusion":[28,69,86,94,109],"systems":[30,48,54,234],"that":[32,112,172,227],"they":[33],"have":[34],"many":[35],"false":[36,39,116,199],"positive":[37],"and":[38,126,164,242],"negative":[40],"events.":[41],"Most":[42],"existing":[45],"Intrusion":[46,159,179],"implemented":[49],"depend":[50],"on":[51],"rule-based":[52],"expert":[53],"where":[55],"new":[56,217],"are":[58],"not":[59],"detectable.":[60],"In":[61,182],"this":[62],"study,":[63],"optimization":[64],"algorithms":[65],"were":[66,169,213],"added":[67],"system":[71,88,96,111,143,226,245],"make":[73],"them":[74],"more":[75,92],"efficient.":[76],"Self":[77,153],"Organizing":[78,154],"Migrating":[79,155],"Genetic":[80,156,177],"Algorithm":[81,157,178],"(SOMGA)":[82],"was":[83,138,162,188,203,228],"integrated":[84],"into":[85],"obtain":[90],"efficient":[93,104],"called":[97],"ID-SOMGA.":[98],"This":[99],"provides":[101],"an":[102,108,174,194],"equally":[103],"method":[105],"implement":[107,141],"returns":[113],"very":[114],"low":[115],"positives.":[117],"Due":[118],"complexities":[121],"involved":[122],"security":[124,232],"issues,":[125],"implementation":[128],"work,":[131],"selected":[132],"values":[133,165],"network":[136],"log":[137],"used":[139],"order":[145],"reduce":[147],"some":[148],"these":[150],"complexities.":[151],"\u2013":[158],"Detection":[160,180],"System":[161],"tested":[163],"result":[168],"compared":[170],"IDS":[175,195],"System.":[181],"terms":[183],"rates,":[186],"ID-SOMGA":[187,202,225],"found":[189],"be":[191],"slower":[192],"than":[193,205],"GA,":[197],"positives":[200],"lower":[204],"what":[206],"obtains":[207],"genetic":[209],"algorithm.":[210],"Both":[211],"schemes":[212],"able":[214],"identify":[216],"patterns":[218],"almost":[219],"same":[222],"way.":[223],"developed":[229],"improved":[230],"networked":[236],"settings":[237],"allowing":[238],"for":[239],"confidentiality,":[240],"integrity":[241],"availability":[243],"resources.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
