{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:56:22Z","timestamp":1757541382571,"version":"3.41.2"},"reference-count":32,"publisher":"World Scientific Pub Co Pte Ltd","issue":"Supp01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Inter. Net."],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:p> The fifth-generation (5G) technology is anticipated to permit connectivity to billions of devices, called the Internet of Things (IoT). The primary benefit of 5G is that it has maximum bandwidth and can drastically expand service beyond cell phones to standard internet service for conventionally fixed connectivity to homes, offices, factories, etc. But IoT devices will unavoidably be the primary target of diverse kinds of cyberattacks, notably distributed denial of service (DDoS) attacks. Since the conventional DDoS mitigation techniques are ineffective for 5G networks, machine learning (ML) approaches find helpful to accomplish better security. With this motivation, this study resolves the network security issues posed by network devices in the 5G networks and mitigates the harmful effects of DDoS attacks. This paper presents a new pigeon-inspired optimization-based feature selection with optimal functional link neural network (FLNN), PIOFS-OFLNN model for mitigating DDoS attacks in the 5G environment. The proposed PIOFS-OFLNN model aims to detect DDoS attacks with the inclusion of feature selection and classification processes. The proposed PIOFS-OFLNN model incorporates different techniques such as pre-processing, feature selection, classification, and parameter tuning. In addition, the PIOFS algorithm is employed to choose an optimal subset of features from the pre-processed data. Besides, the OFLNN based classification model is applied to determine DDoS attacks where the Rat Swarm Optimizer (RSO) parameter tuning takes place to adjust the parameters involved in the FLNN model optimally. FLNN is a low computational interconnectivity higher cognitive neural network. There are still no hidden layers. FLNN\u2019s input vector is operationally enlarged to produce non-linear remedies. More details can be accessed application of Nature-Inspired Method to Odia Written by hand Number system Recognition. To validate the improved DDoS detection performance of the proposed model, a benchmark dataset is used. <\/jats:p>","DOI":"10.1142\/s0219265921410322","type":"journal-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T12:41:04Z","timestamp":1644928864000},"source":"Crossref","is-referenced-by-count":2,"title":["Intelligent Feature Subset Selection with Machine Learning Based Detection and Mitigation of DDoS Attacks in 5G Environment"],"prefix":"10.1142","volume":"22","author":[{"given":"A. G.","family":"Nagesha","sequence":"first","affiliation":[{"name":"Department of ISE, Acharya Institute of Technology, Bengaluru, India"}]},{"given":"G.","family":"Mahesh","sequence":"additional","affiliation":[{"name":"Department of CSE, BMS Institute of Technology and Management, Bengaluru, India"}]},{"family":"Gowrishankar","sequence":"additional","affiliation":[{"name":"Department of CSE, BMS College of Engineering, Bengaluru, India"}]}],"member":"219","published-online":{"date-parts":[[2022,2,14]]},"reference":[{"key":"S0219265921410322BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"issue":"4","key":"S0219265921410322BIB002","first-page":"1","volume":"18","author":"Paulraj D.","year":"2020","journal-title":"International Journal of Wavelets, Multiresolution and Information Processing"},{"key":"S0219265921410322BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5105-3"},{"journal-title":"IEEE Network","year":"2020","author":"Moudoud H.","key":"S0219265921410322BIB004"},{"key":"S0219265921410322BIB005","first-page":"1150","volume-title":"International Conference on Emerging Trends in Electrical and Computer Technology","author":"Gokul Anand J.","year":"2011"},{"key":"S0219265921410322BIB007","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761830"},{"key":"S0219265921410322BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115558"},{"key":"S0219265921410322BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03013-2"},{"key":"S0219265921410322BIB011","doi-asserted-by":"publisher","DOI":"10.1002\/bit.22187"},{"key":"S0219265921410322BIB012","first-page":"1","author":"Hu N.","year":"2021","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"S0219265921410322BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900614"},{"key":"S0219265921410322BIB014","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8801975"},{"volume-title":"Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT","year":"2020","author":"Moudoud H.","key":"S0219265921410322BIB015"},{"key":"S0219265921410322BIB016","first-page":"1","author":"Almiani M.","year":"2021","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"S0219265921410322BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107045"},{"key":"S0219265921410322BIB018","first-page":"1","volume-title":"International Conference on Network-Based Information Systems","author":"Chiu S. T.","year":"2020"},{"key":"S0219265921410322BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2974520"},{"key":"S0219265921410322BIB021","doi-asserted-by":"publisher","DOI":"10.3390\/su12031035"},{"key":"S0219265921410322BIB022","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI49556.2020.9140864"},{"key":"S0219265921410322BIB023","doi-asserted-by":"publisher","DOI":"10.1108\/IJICC-02-2014-0005"},{"key":"S0219265921410322BIB024","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2015.070968"},{"journal-title":"Journal of King Saud University-Computer and Information Sciences","year":"2020","author":"Khan A.","key":"S0219265921410322BIB025"},{"key":"S0219265921410322BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/INVENTIVE.2016.7823198"},{"key":"S0219265921410322BIB027","first-page":"1","author":"Dhiman G.","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"S0219265921410322BIB028","first-page":"1","author":"Mishra A.","year":"2021","journal-title":"Telecommunication Systems"},{"journal-title":"Soft Computing","year":"2021","author":"Berlin M. A.","key":"S0219265921410322BIB029"},{"key":"S0219265921410322BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"S0219265921410322BIB031","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234720"},{"key":"S0219265921410322BIB032","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234743"},{"issue":"1","key":"S0219265921410322BIB033","first-page":"135","volume":"36","author":"Xiujuan Li","year":"2021","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"S0219265921410322BIB034","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2969863"},{"key":"S0219265921410322BIB035","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E96.D.387"}],"container-title":["Journal of Interconnection Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219265921410322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T04:22:33Z","timestamp":1665721353000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219265921410322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,14]]},"references-count":32,"journal-issue":{"issue":"Supp01","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1142\/S0219265921410322"],"URL":"https:\/\/doi.org\/10.1142\/s0219265921410322","relation":{},"ISSN":["0219-2659","1793-6713"],"issn-type":[{"type":"print","value":"0219-2659"},{"type":"electronic","value":"1793-6713"}],"subject":[],"published":{"date-parts":[[2022,2,14]]},"article-number":"2141032"}}