{"id":"https://openalex.org/W4364376065","doi":"https://doi.org/10.3389/fcomp.2023.997159","title":"A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network","display_name":"A novel hybrid autoencoder and modified particle swarm optimization feature selection for intrusion detection in the internet of things network","publication_year":2023,"publication_date":"2023-04-11","ids":{"openalex":"https://openalex.org/W4364376065","doi":"https://doi.org/10.3389/fcomp.2023.997159"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2023.997159","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.997159/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.997159/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057218982","display_name":"Yakub Kayode Saheed","orcid":"https://orcid.org/0000-0002-0804-0707"},"institutions":[{"id":"https://openalex.org/I65734018","display_name":"American University of Nigeria","ror":"https://ror.org/02kv8bx48","country_code":"NG","type":"education","lineage":["https://openalex.org/I65734018"]},{"id":"https://openalex.org/I60470151","display_name":"Modibbo Adama University of Technology","ror":"https://ror.org/015dhe595","country_code":"NG","type":"education","lineage":["https://openalex.org/I60470151"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Yakub Kayode Saheed","raw_affiliation_strings":["American University of Nigeria, Yola, Adamawa State, Nigeria","School of Information Technology and Computing, Yola, Adamawa State, Nigeria"],"affiliations":[{"raw_affiliation_string":"American University of Nigeria, Yola, Adamawa State, Nigeria","institution_ids":["https://openalex.org/I65734018"]},{"raw_affiliation_string":"School of Information Technology and Computing, Yola, Adamawa State, Nigeria","institution_ids":["https://openalex.org/I60470151"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080392524","display_name":"Aisha Abubakar Usman","orcid":null},"institutions":[{"id":"https://openalex.org/I65734018","display_name":"American University of Nigeria","ror":"https://ror.org/02kv8bx48","country_code":"NG","type":"education","lineage":["https://openalex.org/I65734018"]},{"id":"https://openalex.org/I60470151","display_name":"Modibbo Adama University of Technology","ror":"https://ror.org/015dhe595","country_code":"NG","type":"education","lineage":["https://openalex.org/I60470151"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Aisha Abubakar Usman","raw_affiliation_strings":["American University of Nigeria, Yola, Adamawa State, Nigeria","School of Information Technology and Computing, Yola, Adamawa State, Nigeria"],"affiliations":[{"raw_affiliation_string":"American University of Nigeria, Yola, Adamawa State, Nigeria","institution_ids":["https://openalex.org/I65734018"]},{"raw_affiliation_string":"School of Information Technology and Computing, Yola, Adamawa State, Nigeria","institution_ids":["https://openalex.org/I60470151"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065312206","display_name":"Favour Dirwokmwa Sukat","orcid":null},"institutions":[{"id":"https://openalex.org/I60470151","display_name":"Modibbo Adama University of Technology","ror":"https://ror.org/015dhe595","country_code":"NG","type":"education","lineage":["https://openalex.org/I60470151"]},{"id":"https://openalex.org/I65734018","display_name":"American University of Nigeria","ror":"https://ror.org/02kv8bx48","country_code":"NG","type":"education","lineage":["https://openalex.org/I65734018"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Favour Dirwokmwa Sukat","raw_affiliation_strings":["American University of Nigeria, Yola, Adamawa State, Nigeria","School of Information Technology and Computing, Yola, Adamawa State, Nigeria"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computing, Yola, Adamawa State, Nigeria","institution_ids":["https://openalex.org/I60470151"]},{"raw_affiliation_string":"American University of Nigeria, Yola, Adamawa State, Nigeria","institution_ids":["https://openalex.org/I65734018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081515721","display_name":"Muftahu Abdulrahman","orcid":null},"institutions":[{"id":"https://openalex.org/I52605992","display_name":"National Open University of Nigeria","ror":"https://ror.org/009tveq15","country_code":"NG","type":"education","lineage":["https://openalex.org/I52605992"]},{"id":"https://openalex.org/I2799873615","display_name":"African Institute of Science and Technology","ror":"https://ror.org/05rcqrz41","country_code":"NG","type":"education","lineage":["https://openalex.org/I2799873615"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Muftahu Abdulrahman","raw_affiliation_strings":["African Centre of Excellence on Technology Enhanced Learning, Abuja, Nigeria","National Open University of Nigeria, Abuja, Nigeria"],"affiliations":[{"raw_affiliation_string":"National Open University of Nigeria, Abuja, Nigeria","institution_ids":["https://openalex.org/I52605992"]},{"raw_affiliation_string":"African Centre of Excellence on Technology Enhanced Learning, Abuja, Nigeria","institution_ids":["https://openalex.org/I2799873615"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057218982"],"corresponding_institution_ids":["https://openalex.org/I65734018","https://openalex.org/I60470151"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150,"provenance":"doaj"},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150,"provenance":"doaj"},"fwci":3.941,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":11,"citation_normalized_percentile":{"value":0.633114,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"5","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9955,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.85858643},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.52532506}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.85858643},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7942159},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.74278355},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.67122054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6667329},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.64986706},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5615384},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5278554},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.52532506},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4875471},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47598994},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.46356},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.44637498},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35134953},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26090318},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13201663},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2023.997159","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.997159/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2023.997159","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2023.997159/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.44,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":57,"referenced_works":["https://openalex.org/W1569819710","https://openalex.org/W1976262362","https://openalex.org/W1977366836","https://openalex.org/W1993913559","https://openalex.org/W2017420094","https://openalex.org/W2058614926","https://openalex.org/W2066832805","https://openalex.org/W2074213526","https://openalex.org/W2078559757","https://openalex.org/W2105103777","https://openalex.org/W2107867209","https://openalex.org/W2142720090","https://openalex.org/W2306115793","https://openalex.org/W2331106415","https://openalex.org/W2334853001","https://openalex.org/W2426032775","https://openalex.org/W2498302240","https://openalex.org/W2565516711","https://openalex.org/W2791113056","https://openalex.org/W2811205501","https://openalex.org/W2883554196","https://openalex.org/W2914470820","https://openalex.org/W2941288225","https://openalex.org/W2956571997","https://openalex.org/W2958780305","https://openalex.org/W2962621836","https://openalex.org/W2966563104","https://openalex.org/W2980609871","https://openalex.org/W2987654321","https://openalex.org/W2990449675","https://openalex.org/W3006526650","https://openalex.org/W3009422166","https://openalex.org/W3013798241","https://openalex.org/W3014435621","https://openalex.org/W3016470706","https://openalex.org/W3028341128","https://openalex.org/W3033113800","https://openalex.org/W3035366542","https://openalex.org/W3039940949","https://openalex.org/W3040937085","https://openalex.org/W3117835026","https://openalex.org/W3135011374","https://openalex.org/W3196006413","https://openalex.org/W3196325333","https://openalex.org/W4205989500","https://openalex.org/W4206530705","https://openalex.org/W4206751092","https://openalex.org/W4210895438","https://openalex.org/W4220900338","https://openalex.org/W4220957574","https://openalex.org/W4221004701","https://openalex.org/W4283019189","https://openalex.org/W4285742843","https://openalex.org/W4292263417","https://openalex.org/W4295203425","https://openalex.org/W4313635596","https://openalex.org/W987648574"],"related_works":["https://openalex.org/W4297051394","https://openalex.org/W4294770367","https://openalex.org/W3131327266","https://openalex.org/W3013693939","https://openalex.org/W2909431601","https://openalex.org/W2803255133","https://openalex.org/W2752972570","https://openalex.org/W2734887215","https://openalex.org/W2566616303","https://openalex.org/W2159052453"],"abstract_inverted_index":{"The":[0,33,194,209,227],"Internet":[1,12],"of":[2,21,56,60,163,198,207,246,251,260,264,277,281,290,294,313],"Things":[3],"(IoT)":[4],"represents":[5],"a":[6,19,174,249,308],"paradigm":[7],"shift":[8],"in":[9,18,77,161,239,311],"which":[10,63],"the":[11,54,103,124,205,232,236,240,254,267,270,284,299],"is":[13,39,43,87,120,130],"connected":[14,51],"to":[15,74,89,102,144,148,203],"real":[16],"objects":[17],"range":[20],"areas,":[22],"including":[23],"home":[24],"automation,":[25],"industrial":[26],"processes,":[27],"human":[28],"health,":[29],"and":[30,41,133,165,178,187,218,248,262,279,292,315],"environmental":[31],"monitoring.":[32],"global":[34],"market":[35],"for":[36,93,184,192,224],"IoT":[37,61,80,99,225],"devices":[38,52],"booming,":[40],"it":[42,86],"estimated":[44],"that":[45,105,221],"there":[46],"will":[47],"be":[48,65],"50":[49],"billion":[50],"by":[53,97,230],"end":[55],"2025.":[57],"This":[58,128],"explosion":[59],"devices,":[62],"can":[64],"expanded":[66],"more":[67],"easily":[68],"than":[69],"desktop":[70],"PCs,":[71],"has":[72],"led":[73],"an":[75,150,244,258,275,288],"increase":[76],"cyber-attacks":[78],"involving":[79],"devices.":[81,100],"To":[82],"address":[83],"this":[84,146,170],"issue,":[85],"necessary":[88],"create":[90],"novel":[91,175],"approaches":[92],"identifying":[94],"attacks":[95,107],"launched":[96],"hacked":[98],"Due":[101],"possibility":[104],"these":[106],"would":[108],"succeed,":[109],"Intrusion":[110],"Detection":[111],"Systems":[112],"(IDS)":[113],"are":[114,222],"required.":[115],"IDS'":[116],"feature":[117,185],"selection":[118,186],"stage":[119,129,147],"widely":[121],"regarded":[122],"as":[123],"most":[125],"essential":[126],"stage.":[127],"extremely":[131],"time-consuming":[132],"labor-intensive.":[134],"However,":[135],"numerous":[136],"machine":[137,301],"learning":[138,302],"(ML)":[139],"algorithms":[140],"have":[141],"been":[142],"proposed":[143,233,305],"enhance":[145],"boost":[149],"IDS's":[151],"performance.":[152],"These":[153],"approaches,":[154],"however,":[155],"did":[156],"not":[157],"produce":[158],"desirable":[159],"results":[160],"terms":[162,312],"accuracy":[164,245,259,276,289],"detection":[166],"rate":[167],"(DR).":[168],"In":[169,266,296],"paper,":[171],"we":[172],"propose":[173],"hybrid":[176],"Autoencoder":[177],"Modified":[179],"Particle":[180],"Swarm":[181],"Optimization":[182],"(HAEMPSO)":[183],"deep":[188],"neural":[189],"network":[190],"(DNN)":[191],"classification.":[193],"PSO":[195],"with":[196,298],"modification":[197],"inertia":[199],"weight":[200],"was":[201,212],"utilized":[202],"optimize":[204],"parameters":[206],"DNN.":[208],"experimental":[210],"analysis":[211],"performed":[213],"on":[214],"two":[215],"realistic":[216],"UNSW-NB15":[217,241],"BoT-IoT":[219,268],"datasets":[220],"suitable":[223],"environment.":[226],"findings":[228],"obtained":[229],"analyzing":[231],"HAEMPSO":[234],"against":[235],"Generic":[237],"attack":[238,273],"dataset":[242],"gave":[243,287],"98.8%,":[247],"DR":[250,263,280,293,314],"99.9%.":[252],"While":[253,283],"benign":[255,285],"class":[256,286],"revealed":[257,274],"99.9%":[261],"99.7%.":[265],"dataset,":[269],"DDoS":[271],"HTTP":[272],"99.22%":[278],"97.79%.":[282],"97.54%":[291],"97.92%.":[295],"comparison":[297],"state-of-the-art":[300],"schemes,":[303],"our":[304],"HAEMPSO-DNN":[306],"achieved":[307],"competitive":[309],"feat":[310],"accuracy.":[316]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4364376065","counts_by_year":[{"year":2024,"cited_by_count":11}],"updated_date":"2025-01-07T18:17:34.725388","created_date":"2023-04-12"}