{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T04:40:02Z","timestamp":1771562402914,"version":"3.50.1"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100017024","name":"IROST","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100017024","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,22]]},"abstract":"<jats:p>One of the important issues in the computer networks is security. Therefore, trusted communication of information in computer networks is a critical point. To have a safe communication, it is necessary that, in addition to the prevention mechanisms, intrusion detection systems (IDSs) are used. There are various approaches to utilize intrusion detection, but any of these systems is not complete. In this paper, a new cross-correlation-based feature selection (CCFS) method is proposed and compared with the cuttlefish algorithm (CFA) and mutual information-based feature selection (MIFS) features with use of four different classifiers: support vector machine (SVM), naive Bayes (NB), decision tree (DT), and K-nearest neighbor (KNN). The experimental results on the KDD Cup 99, NSL-KDD, AWID, and CIC-IDS2017 datasets show that the proposed method has a better performance in accuracy, precision, recall, and <jats:italic>F<\/jats:italic>1-score criteria in comparison with the other two methods in different classifiers. Also, the results on different classifiers show that the usage of the DT classifier for the proposed method is the best.<\/jats:p>","DOI":"10.1155\/2020\/8875404","type":"journal-article","created":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:26:56Z","timestamp":1600820816000},"page":"1-17","source":"Crossref","is-referenced-by-count":40,"title":["Feature Selection Based on Cross-Correlation for the Intrusion Detection System"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-6027","authenticated-orcid":true,"given":"Gholamreza","family":"Farahani","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science and Technology (IROST), Sh. Ehsani Rad St., Enqelab St., Parsa Sq., Ahmadabad Mostoufi Rd., Azadegan Highway, Tehran 3353136846, Iran"}]}],"member":"311","reference":[{"issue":"6","key":"1","first-page":"1","volume":"3","year":"2013","journal-title":"International Journal of Scientific and Research Publication"},{"issue":"1","key":"2","first-page":"674","volume":"5","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"issue":"5","key":"4","first-page":"47","volume":"2","year":"2013","journal-title":"International Journal Advanced Tren Computer Science Engineering"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-4048(03)00112-3"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"issue":"3","key":"7","first-page":"1917","volume":"3","year":"2018","journal-title":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3390\/app9071392"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.56"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7130868"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.kijoms.2015.07.002"},{"issue":"2","key":"14","first-page":"2266","volume":"6","year":"2014","journal-title":"International Journal of Advanced Networking and Applications"},{"issue":"5","key":"17","first-page":"174","volume":"17","year":"2017","journal-title":"International Journal of Computer Science and Network Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100001"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2411"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.04.003"},{"issue":"1","key":"21","first-page":"39","volume":"4","year":"2018","journal-title":"International Journal of Computer Science and Mathematical Theory"},{"issue":"2","key":"22","doi-asserted-by":"crossref","first-page":"109","DOI":"10.5121\/ijnsa.2012.4208","volume":"4","year":"2012","journal-title":"International Journal of Network Security & Its Applications"},{"issue":"3","key":"25","doi-asserted-by":"crossref","first-page":"65","DOI":"10.5121\/ijcsit.2019.11306","volume":"11","year":"2019","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"28","first-page":"81","year":"1986"},{"issue":"7","key":"30","doi-asserted-by":"crossref","first-page":"34","DOI":"10.5120\/17021-7306","volume":"97","year":"2014","journal-title":"International Journal of Computer Applications"},{"key":"31","first-page":"1531","volume":"5","year":"2004","journal-title":"J. Mach. Learn. Res."},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"34","first-page":"113","volume":"29","year":"2007","journal-title":"Journal of China Railway"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6705347"},{"key":"37","year":"2016"},{"key":"38","volume-title":"Correlation-based feature selection for machine learning","year":"1999"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.009"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"45","first-page":"184","volume":"18","year":"2015","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"49","first-page":"94","volume":"50","year":"2017","journal-title":"ACM Computing Surveys"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.4.30-37"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.3390\/s20092559"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8875404.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8875404.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8875404.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:27:15Z","timestamp":1600820835000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8875404\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":34,"alternative-id":["8875404","8875404"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8875404","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,22]]}}}