{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T00:48:18Z","timestamp":1777682898560,"version":"3.51.4"},"reference-count":46,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2022,11,14]]},"abstract":"<jats:p>Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.<\/jats:p>","DOI":"10.3233\/jhs-220694","type":"journal-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T11:39:46Z","timestamp":1660649986000},"page":"257-273","source":"Crossref","is-referenced-by-count":0,"title":["Mutual clustered redundancy assisted feature selection for an intrusion detection\u00a0system"],"prefix":"10.1177","volume":"28","author":[{"given":"T.","family":"Veeranna","sequence":"first","affiliation":[{"name":"Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India"}]},{"given":"Kiran Kumar","family":"Reddi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India"}]}],"member":"179","reference":[{"issue":"8","key":"10.3233\/JHS-220694_ref1","doi-asserted-by":"publisher","first-page":"1796","DOI":"10.1109\/TCYB.2015.2490802","article-title":"Data randomization and cluster-based partitioning for botnet intrusion detection","volume":"46","author":"Al-Jarrah","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"10.3233\/JHS-220694_ref2","doi-asserted-by":"crossref","unstructured":"A.M.\u00a0Ambusaidi, X.\u00a0He and P.\u00a0Nanda, Unsupervised feature selection method for intrusion detection system, in: International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2015.","DOI":"10.1109\/Trustcom.2015.387"},{"key":"10.3233\/JHS-220694_ref3","doi-asserted-by":"crossref","unstructured":"A.M.\u00a0Ambusaidi, X.\u00a0He and P.\u00a0Nanda, Unsupervised feature selection method for intrusion detection system, in: International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2015.","DOI":"10.1109\/Trustcom.2015.387"},{"key":"10.3233\/JHS-220694_ref4","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","article-title":"Building an intrusion detection system using a filter-based feature selection algorithm","volume":"65","author":"Ambusaidi","year":"2016","journal-title":"IEEE Trans. Comput."},{"issue":"2\/3","key":"10.3233\/JHS-220694_ref5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJIPT.2014.066377","article-title":"Intrusion detection method based on non-linear correlation measure","volume":"8","author":"Ambusaidi","year":"2014","journal-title":"Int. J. Internet Protocol Technology"},{"issue":"4","key":"10.3233\/JHS-220694_ref6","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","article-title":"Mutual information-based feature selection for intrusion detection systems","volume":"34","author":"Amiri","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"10.3233\/JHS-220694_ref7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7763\/IJCCE.2014.V3.281","article-title":"Empirical study of artificial fish swarm algorithm","volume":"3","author":"Azizi","year":"2014","journal-title":"Int. J. Comput. Commun. Netw."},{"key":"10.3233\/JHS-220694_ref8","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","article-title":"FCM: The fuzzy c-means clustering algorithm","volume":"10","author":"Bezdek","year":"1984","journal-title":"Comput. Geosci."},{"key":"10.3233\/JHS-220694_ref9","unstructured":"L.\u00a0Breiman, J.\u00a0Friedman, C.\u00a0Stone and R.A.\u00a0Olshan, Classification and Regression Trees, CRC Press, Inc., 1984."},{"key":"10.3233\/JHS-220694_ref10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1260\/1748-3018.8.1.59","article-title":"Analysis of network security data using wavelet transforms","volume":"8","author":"Donghong","year":"2014","journal-title":"J. Algorithm. Comput. Technol."},{"key":"10.3233\/JHS-220694_ref11","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.asej.2013.01.003","article-title":"A hybrid network intrusion detection framework basedon random forests and weighted k-means","volume":"4","author":"Elbasiony","year":"2013","journal-title":"Ain Shams Engineering Journal"},{"key":"10.3233\/JHS-220694_ref12","doi-asserted-by":"crossref","unstructured":"G.\u00a0Farahani, Feature selection based on cross-correlation for the intrusion detection system, Hindawi Security and Communication Networks 2020 (2020), Article ID 8875404.","DOI":"10.1155\/2020\/8875404"},{"key":"10.3233\/JHS-220694_ref13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.14257\/ijca.2016.9.4.11","article-title":"An optimized artificial bee colony algorithm for clustering","volume":"9","author":"Gong","year":"2016","journal-title":"Int. J. Control Autom."},{"key":"10.3233\/JHS-220694_ref14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","article-title":"A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection","volume":"136","author":"Hajisalem","year":"2018","journal-title":"Computer Networks"},{"key":"10.3233\/JHS-220694_ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58424-9_2"},{"key":"10.3233\/JHS-220694_ref16","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"Hinton","year":"2006","journal-title":"Science"},{"key":"10.3233\/JHS-220694_ref17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.04.012","article-title":"False alarm minimization techniques in signature-based intrusion detection systems: A survey","volume":"49","author":"Hubballi","year":"2014","journal-title":"Comput. Commun."},{"key":"10.3233\/JHS-220694_ref18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2015.12.006","article-title":"Intrusion response systems: Foundations, design, and challenges","volume":"62","author":"Inayat","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"issue":"3\/4","key":"10.3233\/JHS-220694_ref19","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1504\/IJENM.2018.094664","article-title":"An anomaly-based network intrusion detection system using ensemble clustering","volume":"9","author":"Jackins","year":"2018","journal-title":"International Journal of Enterprise Network Management"},{"issue":"1","key":"10.3233\/JHS-220694_ref20","doi-asserted-by":"publisher","first-page":"215","DOI":"10.14257\/ijsia.2016.10.1.20","article-title":"Some clustering-based methodology applications to anomaly intrusion detection systems","volume":"10","author":"Jecheva","year":"2016","journal-title":"International Journal of Security and Its Applications"},{"key":"10.3233\/JHS-220694_ref21","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.jnca.2015.12.004","article-title":"A multi-level intrusion detection method for abnormal network behaviors","volume":"62","author":"Ji","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.3233\/JHS-220694_ref22","first-page":"20","article-title":"Survey of intrusion detection systems: Techniques, datasets and challenges","volume":"2","author":"Khraisat","year":"2020","journal-title":"Cyber security, Springer open"},{"key":"10.3233\/JHS-220694_ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECE.2016.8009581"},{"issue":"6","key":"10.3233\/JHS-220694_ref24","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/3136625","article-title":"Feature selection: A data perspective","volume":"50","author":"Li","year":"2018","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.3233\/JHS-220694_ref25","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"10.3233\/JHS-220694_ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.57"},{"key":"10.3233\/JHS-220694_ref27","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1302\/3\/032011"},{"key":"10.3233\/JHS-220694_ref28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jisa.2018.11.007","article-title":"Cyber intrusion detection by combined feature selection algorithm","volume":"44","author":"Mohammadi","year":"2019","journal-title":"Journal of Information Security and Applications"},{"key":"10.3233\/JHS-220694_ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2011.5999520"},{"key":"10.3233\/JHS-220694_ref30","doi-asserted-by":"crossref","unstructured":"H.\u00a0Nguyen, K.\u00a0Franke and S.\u00a0Petrovi\u2019c, Improving effectiveness of intrusion detection by correlation feature selection, in: 5th Int. Conf. Availability, Reliab. Secur., Krakow, Poland, 2010, pp.\u00a017\u201324.","DOI":"10.1109\/ARES.2010.70"},{"key":"10.3233\/JHS-220694_ref31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.21015\/vtse.v9i2.403","article-title":"Practical network anomaly detection using data mining techniques","volume":"9","author":"Ni","year":"2016","journal-title":"VFAST Trans. Softw. Eng."},{"key":"10.3233\/JHS-220694_ref32","unstructured":"Perona, I.\u00a0Gurrutxaga, O.\u00a0Arbelaitz, J.I.\u00a0Mart\u00edn, J.\u00a0Muguerza and J.M.\u00a0P\u00e9rez, Service-independent payload analysis to improve intrusion detection in network traffic, in: Proceedings of the 7th Australasian Data Mining Conference (AusDM08), Adelaide, Australia, 171\u2013178, 2008."},{"key":"10.3233\/JHS-220694_ref34","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1126\/science.1242072","article-title":"Clustering by fast search and find of density peaks","volume":"344","author":"Rodriguez","year":"2014","journal-title":"Science"},{"issue":"2","key":"10.3233\/JHS-220694_ref35","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/846183.846204","article-title":"Kdd-cup 99: Knowledge discovery in a charitable organization\u2019s donor database","volume":"1","author":"Rosset","year":"2000","journal-title":"SIGKDD Explorat."},{"issue":"3","key":"10.3233\/JHS-220694_ref36","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0167-2789(98)00269-3","article-title":"Estimating the errors on measured entropy and mutual information","volume":"125","author":"Roulston","year":"1999","journal-title":"Physica D: Nonlinear Phenomena"},{"key":"10.3233\/JHS-220694_ref37","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1007\/s12083-019-00822-3","article-title":"Enhanced intrusion detection system via agent clustering and classification based on outlier detection","volume":"13","author":"Sandosh","year":"2020","journal-title":"peer-to-peer Netw. Appl."},{"key":"10.3233\/JHS-220694_ref38","doi-asserted-by":"crossref","unstructured":"I.\u00a0Sharafaldin, A.\u00a0Habibi Lashkari and A.A.\u00a0Ghorbani, Toward generating a new intrusion detection dataset and intrusion traffic characterization, in: 4th International Conference on Information Systems Security and Privacy (ICISSP), Portugal, 2018.","DOI":"10.5220\/0006639801080116"},{"key":"10.3233\/JHS-220694_ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"issue":"12","key":"10.3233\/JHS-220694_ref40","first-page":"987","article-title":"Feature grouping for intrusion detection based on mutual information","volume":"9","author":"Song","year":"2014","journal-title":"Journal of Communications"},{"issue":"7","key":"10.3233\/JHS-220694_ref41","doi-asserted-by":"crossref","first-page":"1542","DOI":"10.4304\/jcp.9.7.1542-1546","article-title":"Modified mutual information-based feature selection for intrusion detection systems in decision tree learning","volume":"9","author":"Song","year":"2014","journal-title":"Journal of Computers"},{"key":"10.3233\/JHS-220694_ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"10","key":"10.3233\/JHS-220694_ref43","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","article-title":"Intrusion detection by machine learning: A review","volume":"36","author":"Tsai","year":"2009","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JHS-220694_ref45","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TLA.2015.7069114","article-title":"Anomaly-based network intrusion detection system","volume":"13","author":"Villalba","year":"2015","journal-title":"IEEE Lat. Am. Trans."},{"key":"10.3233\/JHS-220694_ref46","doi-asserted-by":"publisher","first-page":"238","DOI":"10.3390\/app9020238","article-title":"Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks","volume":"9","author":"Yang","year":"2019","journal-title":"Appl. Sci."},{"key":"10.3233\/JHS-220694_ref47","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-6239-145-1_12"},{"key":"10.3233\/JHS-220694_ref48","doi-asserted-by":"publisher","DOI":"10.3390\/app8091535"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-220694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:44:25Z","timestamp":1777452265000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JHS-220694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,14]]},"references-count":46,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jhs-220694","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"value":"1875-8940","type":"electronic"},{"value":"0926-6801","type":"print"}],"subject":[],"published":{"date-parts":[[2022,11,14]]}}}