{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:18:09Z","timestamp":1768522689124,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030708801","type":"print"},{"value":"9783030708818","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70881-8_1","type":"book-chapter","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T05:18:27Z","timestamp":1614316707000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New Wrapper Feature Selection Algorithm for Anomaly-Based Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Meriem","family":"Kherbache","sequence":"first","affiliation":[]},{"given":"David","family":"Espes","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Amroun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jocs.2017.03.006","volume":"25","author":"S Aljawarneh","year":"2018","unstructured":"Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152\u2013160 (2018)","journal-title":"J. Comput. Sci."},{"issue":"10","key":"1_CR2","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986\u20132998 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Davis, A., Gill, S., Wong, R., Tayeb, S.: Feature selection for deep neural networks in cyber security applications. In: 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/IEMTRONICS51293.2020.9216403"},{"issue":"5","key":"1_CR4","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1016\/j.eswa.2014.11.009","volume":"42","author":"AS Eesa","year":"2015","unstructured":"Eesa, A.S., Orman, Z., Brifcani, A.M.A.: A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Syst. Appl. 42(5), 2670\u20132679 (2015)","journal-title":"Expert Syst. Appl."},{"key":"1_CR5","unstructured":"Hall, M.A.: Correlation-based feature selection for machine learning (1999)"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.neucom.2014.09.083","volume":"164","author":"E De la Hoz","year":"2015","unstructured":"De la Hoz, E., De La Hoz, E., Ortiz, A., Ortega, J., Prieto, B.: PCA filtering and probabilistic SOM for network intrusion detection. Neurocomputing 164, 71\u201381 (2015)","journal-title":"Neurocomputing"},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1504\/IJHPCN.2019.097503","volume":"13","author":"MH Kamarudin","year":"2019","unstructured":"Kamarudin, M.H., Maple, C., Watson, T.: Hybrid feature selection technique for intrusion detection system. Int. J. High Perform. Comput. Netw. 13(2), 232\u2013240 (2019)","journal-title":"Int. J. High Perform. Comput. Netw."},{"issue":"2","key":"1_CR8","first-page":"271","volume":"2","author":"AG Karegowda","year":"2010","unstructured":"Karegowda, A.G., Manjunath, A., Jayaram, M.: Comparative study of attribute selection using gain ratio and correlation based feature selection. Int. J. Inf. Technol. Knowl. Manage. 2(2), 271\u2013277 (2010)","journal-title":"Int. J. Inf. Technol. Knowl. Manage."},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Khammassi, C., Krichen, S.: A GA-LR wrapper approach for feature selection in network intrusion detection. Comput. Secur. 70, 255\u2013277 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.06.005. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404817301244","DOI":"10.1016\/j.cose.2017.06.005"},{"key":"1_CR10","unstructured":"Kumari, B., Swarnkar, T.: Filter versus wrapper feature subset selection in large dimensionality micro array: a review (2011)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Muttaqien, I.Z., Ahmad, T.: Increasing performance of IDS by selecting and transforming features. In: 2016 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT), pp. 85\u201390. IEEE (2016)","DOI":"10.1109\/COMNETSAT.2016.7907422"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Nskh, P., Varma, M.N., Naik, R.R.: Principle component analysis based intrusion detection system using support vector machine. In: IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 1344\u20131350. IEEE (2016)","DOI":"10.1109\/RTEICT.2016.7808050"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.future.2017.09.056","volume":"79","author":"D Papamartzivanos","year":"2018","unstructured":"Papamartzivanos, D., M\u00e1rmol, F.G., Kambourakis, G.: Dendron: genetic trees driven rule induction for network intrusion detection systems. Future Gener. Comput. Syst. 79, 558\u2013574 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"12","key":"1_CR14","first-page":"1848","volume":"2","author":"S Revathi","year":"2013","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. 2(12), 1848\u20131853 (2013)","journal-title":"Int. J. Eng. Res. Technol."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Shahbaz, M.B., Wang, X., Behnad, A., Samarabandu, J.: On efficiency enhancement of the correlation-based feature selection for intrusion detection systems. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/IEMCON.2016.7746286"},{"key":"1_CR16","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, pp. 1\u20136. IEEE (2009)"},{"key":"1_CR17","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-30348-2_7","volume-title":"Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC \u2013 16\u2019)","author":"IS Thaseen","year":"2016","unstructured":"Thaseen, I.S., Kumar, C.A.: Intrusion detection model using chi square feature selection and modified Na\u00efve bayes classifier. In: Vijayakumar, V., Neelanarayanan, V. (eds.) Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC \u2013 16\u2019). SIST, vol. 49, pp. 81\u201391. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30348-2_7"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.knosys.2017.09.014","volume":"136","author":"H Wang","year":"2017","unstructured":"Wang, H., Gu, J., Wang, S.: An effective intrusion detection framework based on SVM with feature augmentation. Knowl.-Based Syst. 136, 130\u2013139 (2017)","journal-title":"Knowl.-Based Syst."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Y.F., Liu, P.Y., Ren, M., Chen, X.X.: Intrusion detection algorithms based on correlation information entropy and binary particle swarm optimization. In: 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 2829\u20132834. IEEE (2017)","DOI":"10.1109\/FSKD.2017.8393229"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70881-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T05:29:08Z","timestamp":1614317348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-70881-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030708801","9783030708818"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70881-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Foundations and Practice of Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fps2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fps-symposium.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}