{"id":"https://openalex.org/W4399710185","doi":"https://doi.org/10.1016/j.iswa.2024.200407","title":"Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system","display_name":"Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system","publication_year":2024,"publication_date":"2024-06-15","ids":{"openalex":"https://openalex.org/W4399710185","doi":"https://doi.org/10.1016/j.iswa.2024.200407"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.iswa.2024.200407","pdf_url":null,"source":{"id":"https://openalex.org/S4210234522","display_name":"Intelligent Systems with Applications","issn_l":"2667-3053","issn":["2667-3053"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.iswa.2024.200407","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101828523","display_name":"Jing Li","orcid":"https://orcid.org/0000-0002-8235-9038"},"institutions":[{"id":"https://openalex.org/I4210147344","display_name":"Malaysia University of Science and Technology","ror":"https://ror.org/04frcff47","country_code":"MY","type":"education","lineage":["https://openalex.org/I4210147344"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Jing Li","raw_affiliation_strings":["University of Technology Malaysia, China"],"affiliations":[{"raw_affiliation_string":"University of Technology Malaysia, China","institution_ids":["https://openalex.org/I4210147344"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089927436","display_name":"Hewan Chen","orcid":"https://orcid.org/0009-0003-6259-3817"},"institutions":[{"id":"https://openalex.org/I55538621","display_name":"China Jiliang University","ror":"https://ror.org/05v1y0t93","country_code":"CN","type":"education","lineage":["https://openalex.org/I55538621"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hewan Chen","raw_affiliation_strings":["China Jiliang University, China"],"affiliations":[{"raw_affiliation_string":"China Jiliang University, China","institution_ids":["https://openalex.org/I55538621"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097242900","display_name":"Mohd Othman Shahizan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210147344","display_name":"Malaysia University of Science and Technology","ror":"https://ror.org/04frcff47","country_code":"MY","type":"education","lineage":["https://openalex.org/I4210147344"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mohd Othman Shahizan","raw_affiliation_strings":["University of Technology Malaysia, China"],"affiliations":[{"raw_affiliation_string":"University of Technology Malaysia, China","institution_ids":["https://openalex.org/I4210147344"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079146277","display_name":"Lizawati Mi Yusuf","orcid":"https://orcid.org/0000-0003-4171-3253"},"institutions":[{"id":"https://openalex.org/I4210147344","display_name":"Malaysia University of Science and Technology","ror":"https://ror.org/04frcff47","country_code":"MY","type":"education","lineage":["https://openalex.org/I4210147344"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Lizawati Mi Yusuf","raw_affiliation_strings":["University of Technology Malaysia, China"],"affiliations":[{"raw_affiliation_string":"University of Technology Malaysia, China","institution_ids":["https://openalex.org/I4210147344"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101828523"],"corresponding_institution_ids":["https://openalex.org/I4210147344"],"apc_list":{"value":1500,"currency":"USD","value_usd":1500,"provenance":"doaj"},"apc_paid":{"value":1500,"currency":"USD","value_usd":1500,"provenance":"doaj"},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":84},"biblio":{"volume":"23","issue":null,"first_page":"200407","last_page":"200407"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5754105}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.766654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.65413886},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.643519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5834789},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5754105},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.52488965},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.055063844},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.iswa.2024.200407","pdf_url":null,"source":{"id":"https://openalex.org/S4210234522","display_name":"Intelligent Systems with Applications","issn_l":"2667-3053","issn":["2667-3053"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.iswa.2024.200407","pdf_url":null,"source":{"id":"https://openalex.org/S4210234522","display_name":"Intelligent Systems with Applications","issn_l":"2667-3053","issn":["2667-3053"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.74}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":59,"referenced_works":["https://openalex.org/W153260845","https://openalex.org/W1969466477","https://openalex.org/W2076384720","https://openalex.org/W2084496302","https://openalex.org/W2097034581","https://openalex.org/W2134295053","https://openalex.org/W2191006491","https://openalex.org/W2267339884","https://openalex.org/W2284098035","https://openalex.org/W2334853001","https://openalex.org/W2557450880","https://openalex.org/W2626468835","https://openalex.org/W2763978449","https://openalex.org/W2807786182","https://openalex.org/W2883554196","https://openalex.org/W2892556724","https://openalex.org/W2911505293","https://openalex.org/W2913330314","https://openalex.org/W2915854814","https://openalex.org/W2958489519","https://openalex.org/W2963748489","https://openalex.org/W3019959491","https://openalex.org/W3035366542","https://openalex.org/W3086419524","https://openalex.org/W3095531713","https://openalex.org/W3097529015","https://openalex.org/W3106059286","https://openalex.org/W3106741970","https://openalex.org/W3135011374","https://openalex.org/W3162956350","https://openalex.org/W3163301462","https://openalex.org/W3198200730","https://openalex.org/W3206599325","https://openalex.org/W3210361010","https://openalex.org/W4205136287","https://openalex.org/W4206130810","https://openalex.org/W4206141718","https://openalex.org/W4206450891","https://openalex.org/W4212808029","https://openalex.org/W4220930691","https://openalex.org/W4221004701","https://openalex.org/W4230861355","https://openalex.org/W4232484810","https://openalex.org/W4234180224","https://openalex.org/W4236864142","https://openalex.org/W4254183670","https://openalex.org/W4281261386","https://openalex.org/W4289633058","https://openalex.org/W4289929824","https://openalex.org/W4296347973","https://openalex.org/W4298289529","https://openalex.org/W4300874179","https://openalex.org/W4312126076","https://openalex.org/W4312258358","https://openalex.org/W4312601059","https://openalex.org/W4312630922","https://openalex.org/W4386997170","https://openalex.org/W4387647860","https://openalex.org/W987648574"],"related_works":["https://openalex.org/W4361251261","https://openalex.org/W4311097251","https://openalex.org/W4247463117","https://openalex.org/W4245926026","https://openalex.org/W4200598720","https://openalex.org/W3031181660","https://openalex.org/W2950174689","https://openalex.org/W2921026492","https://openalex.org/W2625093826","https://openalex.org/W2586548817"],"abstract_inverted_index":{"Internet":[0],"of":[1,54,67,240],"Things":[2],"(IoT)":[3],"devices":[4],"are":[5,9,170,211,263],"extensively":[6],"utilized":[7],"but":[8],"susceptible":[10],"to":[11,43,50,57,154,220,248],"cyberattacks,":[12],"posing":[13],"significant":[14,228],"security":[15],"challenges.":[16],"To":[17],"mitigate":[18],"these":[19],"threats,":[20],"machine":[21,122],"learning":[22,123],"techniques":[23,35,75,146],"have":[24],"been":[25],"implemented":[26],"for":[27,76,91,214,257,265,283],"network":[28,77],"intrusion":[29,78],"detection":[30,55,79,276],"in":[31,48,82,201,281],"IoT":[32,83,259,284],"environments.":[33,260],"These":[34,261],"commonly":[36],"employ":[37],"various":[38],"feature":[39,68,72,175,221],"reduction":[40],"methods,":[41,101,109,156,242],"prior":[42],"inputting":[44],"data":[45],"into":[46,274],"models,":[47],"order":[49],"enhance":[51],"the":[52,86,187,236],"efficiency":[53,280],"processes":[56],"meet":[58],"real-time":[59],"requirements.":[60],"This":[61],"study":[62,205],"provides":[63],"a":[64,245],"comprehensive":[65],"comparison":[66],"selection":[69],"(FS)":[70],"and":[71,88,94,105,107,116,137,151,194,217,269,278],"extraction":[73],"(FE)":[74],"systems":[80],"(NIDS)":[81],"environments,":[84],"utilizing":[85],"TON-IoT":[87],"BoT-IoT":[89],"datasets":[90,216],"both":[92,266],"binary":[93],"multi-class":[95],"classification":[96],"tasks.":[97],"We":[98],"evaluated":[99],"FS":[100,155,190,225],"including":[102],"Pearson":[103],"correlation":[104],"Chi-square,":[106],"FE":[108,145,209,241],"such":[110],"as":[111,186],"Principal":[112],"Component":[113],"Analysis":[114],"(PCA)":[115],"Autoencoders":[117],"(AE),":[118],"across":[119],"five":[120],"classic":[121],"models:":[124],"Decision":[125],"Tree":[126],"(DT),":[127],"Random":[128],"Forest":[129],"(RF),":[130],"Naive":[131],"Bayes":[132],"(NB),":[133],"k-Nearest":[134],"Neighbors":[135],"(kNN),":[136],"Multi-Layer":[138],"Perceptron":[139],"(MLP).":[140],"Our":[141],"analysis":[142],"revealed":[143],"that":[144,208],"generally":[147],"achieve":[148],"higher":[149,166,237],"accuracy":[150],"robustness":[152],"compared":[153],"with":[157,160,173,180,231],"RF":[158],"paired":[159],"AE":[161,200],"delivering":[162],"superior":[163],"performance":[164,193,229,277],"despite":[165],"computational":[167,195,238,279],"demands.":[168],"DTs":[169],"most":[171,188],"effective":[172,213],"smaller":[174],"sets,":[176],"while":[177],"MLPs":[178],"excel":[179],"larger":[181],"sets.":[182],"Chi-square":[183],"is":[184],"identified":[185],"efficient":[189],"method,":[191],"balancing":[192],"efficiency,":[196],"whereas":[197,224],"PCA":[198],"outperforms":[199],"runtime":[202],"efficiency.":[203],"The":[204],"also":[206],"highlights":[207],"methods":[210,226],"more":[212,232],"complex":[215,258],"less":[218],"sensitive":[219],"set":[222],"size,":[223],"show":[227],"improvements":[230],"informative":[233],"features.":[234],"Despite":[235],"costs":[239],"they":[243],"demonstrate":[244],"greater":[246],"capability":[247],"detect":[249],"diverse":[250],"attack":[251],"types,":[252],"making":[253],"them":[254],"particularly":[255],"suitable":[256],"findings":[262],"crucial":[264],"academic":[267],"research":[268],"industry":[270],"applications,":[271],"providing":[272],"insights":[273],"optimizing":[275],"NIDS":[282],"networks.":[285]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4399710185","counts_by_year":[],"updated_date":"2024-12-08T13:57:19.252686","created_date":"2024-06-16"}