{"id":"https://openalex.org/W3208245024","doi":"https://doi.org/10.1109/ccci52664.2021.9583206","title":"Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection","display_name":"Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection","publication_year":2021,"publication_date":"2021-10-15","ids":{"openalex":"https://openalex.org/W3208245024","doi":"https://doi.org/10.1109/ccci52664.2021.9583206","mag":"3208245024"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci52664.2021.9583206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039199020","display_name":"Dongliang Xuan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongliang Xuan","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054424212","display_name":"Huaping Hu","orcid":"https://orcid.org/0000-0002-1651-0385"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaping Hu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069314924","display_name":"Bidong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bidong Wang","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100461646","display_name":"Bo Liu","orcid":"https://orcid.org/0000-0002-3603-6617"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Liu","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.236,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.563076,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":81},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.68937624},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47028401}],"concepts":[{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.8140522},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081236},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.78460914},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.73500836},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.68937624},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5760306},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5384433},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.52528036},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.51545554},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5014055},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47028401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18046635},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccci52664.2021.9583206","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":30,"referenced_works":["https://openalex.org/W1495061682","https://openalex.org/W1560107318","https://openalex.org/W2076384720","https://openalex.org/W2099940443","https://openalex.org/W2100537916","https://openalex.org/W2108318847","https://openalex.org/W2148143831","https://openalex.org/W2188268519","https://openalex.org/W2267339884","https://openalex.org/W2287408518","https://openalex.org/W2330219538","https://openalex.org/W2533684757","https://openalex.org/W2615173403","https://openalex.org/W2768211408","https://openalex.org/W2794890550","https://openalex.org/W2840169530","https://openalex.org/W2921134108","https://openalex.org/W2942576940","https://openalex.org/W2957352360","https://openalex.org/W2974474972","https://openalex.org/W2980576170","https://openalex.org/W2996763767","https://openalex.org/W2999733746","https://openalex.org/W3014732532","https://openalex.org/W3018495625","https://openalex.org/W3042855339","https://openalex.org/W3093410479","https://openalex.org/W3143021555","https://openalex.org/W3214373139","https://openalex.org/W4237332204"],"related_works":["https://openalex.org/W60934498","https://openalex.org/W2899285606","https://openalex.org/W2746581472","https://openalex.org/W2387580700","https://openalex.org/W2376886931","https://openalex.org/W2374845301","https://openalex.org/W2061466315","https://openalex.org/W2018632273","https://openalex.org/W2010561419","https://openalex.org/W1992118813"],"abstract_inverted_index":{"With":[0],"the":[1,42,120,123],"emergence":[2],"of":[3,41,46,58,122,157],"increasingly":[4],"growing":[5],"network":[6,8,31,54,85],"threats,":[7],"security":[9,86],"becomes":[10],"a":[11,93,155],"major":[12],"issue":[13],"which":[14,34],"causes":[15],"huge":[16],"existing":[17],"and":[18,52,64,78,102,129,143,154],"potential":[19],"losses,":[20],"such":[21],"as":[22],"WannaCry.":[23],"Various":[24],"methods":[25],"had":[26],"been":[27],"adopted":[28],"to":[29,48,67,118,150],"maintain":[30],"security,":[32],"among":[33],"Intrusion":[35],"Detection":[36],"System":[37],"(IDS)":[38],"is":[39],"one":[40],"most":[43],"essential":[44],"parts":[45],"cybersecurity":[47],"defense":[49],"against":[50,127],"sophisticated":[51],"ever-growing":[53],"attacks.":[55],"A":[56],"number":[57],"researchers":[59],"have":[60],"studied":[61],"comprehensive":[62],"datasets":[63,117],"effective":[65],"approaches":[66],"build":[68],"IDS.":[69],"Machine":[70],"learning":[71,99],"models":[72,100,131],"are":[73],"also":[74,111],"applied":[75],"in":[76,82,152,159],"IDS":[77,95,140],"obtained":[79],"considerable":[80],"results":[81,134],"building":[83],"better":[84],"system.":[87],"In":[88],"this":[89],"paper,":[90],"we":[91],"proposed":[92,138],"two-stage":[94,124,139],"based":[96],"on":[97,114],"machine":[98],"RF":[101,128,142],"SVM":[103,130,144],"optimized":[104],"with":[105,145],"Feature":[106],"Selection":[107],"algorithm":[108],"CFS.":[109],"We":[110],"conducted":[112],"experiments":[113],"NSL-KDD":[115],"benchmark":[116],"evaluate":[119],"performance":[121],"IDS,":[125],"comparing":[126],"respectively.":[132],"The":[133],"demonstrated":[135],"that":[136],"our":[137],"outperformed":[141],"an":[146],"increase":[147],"from":[148],"4.31%":[149],"14.62%":[151],"Precision":[153],"reduction":[156],"93.84%":[158],"time":[160],"than":[161],"SVM.":[162]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3208245024","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2025-01-04T23:23:35.968491","created_date":"2021-11-08"}