{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:07:59Z","timestamp":1777705679006,"version":"3.51.4"},"reference-count":23,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,5,4]]},"abstract":"<jats:p>Network flaws are used by hackers to get access to private systems and data. This data and system access may be extremely destructive with losses. Therefore, this network intrusions detection is utmost significance. While investigating every feature set in the network, deep learning-based algorithms require certain inputs. That\u2019s why, an Adaptive Artificial Neural Network Optimized with Oppositional Crow Search Algorithm is proposed for network intrusions detection (IDS-AANN-OCSA). The proposed method includes several phases, including feature selection, preprocessing, data acquisition, and classification. Here, the datas are gathered via CICIDS 2017 dataset. The datas are fed to pre-processing. During pre-processing, redundancy eradication and missing value replacement is carried out with the help of random forest along Local least squares for removing uncertainties. The pre-processed datas are fed to feature selection to select better features. The feature selection is accomplished under hybrid genetic algorithm together with particle swarm optimization technique (GPSO). The selected features are fed to adaptive artificial neural network (AANN) for categorization which categorizes the data as BENIGN, DOS Hulk, PortScan, DDoS, DoS Golden Eye. Finally, the hyper parameter of adaptive artificial neural network is tuned with Oppositional Crow Search Algorithm (OCSA) helps to gain better classification of network intrusions. The proposed approach is activated in Python, and its efficiency is evaluated with certain performance metrics, like accuracy, recall, specificity, precision, F score, sensitivity. The performance of proposed approach achieves better accuracy 99.75%, 97.85%, 95.13%, 98.79, better sensitivity 96.34%, 91.23%, 89.12%, 87.25%, compared with existing methods, like One-Dimensional Convolutional Neural Network Based Deep Learning for Network Intrusion Detection (IDS-CNN-GPSO), An innovative network intrusion detection scheme (IDS-CNN-LSTM) and Application of deep learning to real-time Web intrusion detection (IDS-CNN-ML-AIDS) methods respectively.<\/jats:p>","DOI":"10.3233\/jifs-222120","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T11:21:46Z","timestamp":1677237706000},"page":"8561-8571","source":"Crossref","is-referenced-by-count":5,"title":["An efficient feature selection and classification approach for an intrusion detection system using Optimal Neural Network"],"prefix":"10.1177","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3863-1126","authenticated-orcid":false,"given":"S.","family":"Gokul Pran","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, Andhra Pradesh, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6653-1117","authenticated-orcid":false,"given":"Sivakami","family":"Raja","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Rajalakshmi Engineering College, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"issue":"19","key":"10.3233\/JIFS-222120_ref2","doi-asserted-by":"crossref","first-page":"3079","DOI":"10.3390\/electronics11193079","article-title":"Explainable Artificial Intelligence for Intrusion Detection System","volume":"11","author":"Patil","year":"2022","journal-title":"Electronics"},{"issue":"2","key":"10.3233\/JIFS-222120_ref3","first-page":"187","article-title":"Evaluating the CIC IDS-dataset using machine learning methods and creating multiple predictive models in the statistical computing language R","volume":"5","author":"Pelletier","year":"2020","journal-title":"Science"},{"issue":"1-2","key":"10.3233\/JIFS-222120_ref4","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1504\/IJICS.2021.117392","article-title":"CICIDSdataset: performance improvements and validation as a robust intrusion detection system testbed","volume":"16","author":"Boukhamla","year":"2021","journal-title":"International Journal of Information and Computer Security"},{"key":"10.3233\/JIFS-222120_ref5","doi-asserted-by":"crossref","unstructured":"Lohiya R. , Thakkar A. Intrusion detection using deep neural network with antirectifier layer, In Applied Soft Computing and Communication Networks, (2021), 89\u2013105. Springer, Singapore.","DOI":"10.1007\/978-981-33-6173-7_7"},{"key":"10.3233\/JIFS-222120_ref6","first-page":"1","article-title":"Intrusion detection system overreal-time data traffic using machine learning methods with featureselection approaches,","author":"Sah","year":"2022","journal-title":"International Journal of InformationSecurity"},{"issue":"20","key":"10.3233\/JIFS-222120_ref7","doi-asserted-by":"crossref","first-page":"12667","DOI":"10.1007\/s00500-021-06067-8","article-title":"Ensemble classification for intrusion detection via feature extraction based on deep Learning","volume":"25","author":"Yousefnezhad","year":"2021","journal-title":"Soft Computing"},{"issue":"3","key":"10.3233\/JIFS-222120_ref8","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/fi12030044","article-title":"Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks","volume":"12","author":"Ferrag","year":"2020","journal-title":"Future Internet"},{"issue":"7","key":"10.3233\/JIFS-222120_ref9","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.3390\/sym14071461","article-title":"Advanced feature-selection-based hybrid ensemble learning algorithms for network intrusion detection systems","volume":"14","author":"Mhawi","year":"2022","journal-title":"Symmetry"},{"key":"10.3233\/JIFS-222120_ref10","doi-asserted-by":"crossref","unstructured":"Zhiqiang L. , Zhijun L. , Ting G. , Yucheng S. , Ghulam M.U. Intrusion detection using deep neural network with antirectifier layer, In Applied Soft Computing and Communication Networks, (2021), 89\u2013105. Springer, Singapore.","DOI":"10.1007\/978-981-33-6173-7_7"},{"issue":"1","key":"10.3233\/JIFS-222120_ref11","first-page":"7","article-title":"Bald eagle search optimization algorithm for cluster head selection with prolong lifetime in wireless sensor network","volume":"1","author":"Shajin","year":"2020","journal-title":"Journal of Soft Computing and Engineering Applications"},{"key":"10.3233\/JIFS-222120_ref15","doi-asserted-by":"crossref","first-page":"64375","DOI":"10.1109\/ACCESS.2022.3182333","article-title":"RTIDS: a robust transformer-based approach for intrusion detection system","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Access"},{"issue":"5","key":"10.3233\/JIFS-222120_ref16","first-page":"2088","article-title":"An intrusion detection system for packet and flow based networks using deep neural network approach","volume":"10","author":"Farhana","year":"2020","journal-title":"Computer Engineering"},{"key":"10.3233\/JIFS-222120_ref18","doi-asserted-by":"crossref","first-page":"201728","DOI":"10.1109\/ACCESS.2020.3035967","article-title":"A deep hierarchical network for packet-level malicious traffic detection","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222120_ref19","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/j.inffus.2022.09.026","article-title":"Fusion of statistical importance for feature selection in Deep Neural Network-based Intrusion Detection System","volume":"90","author":"Thakkar","year":"2023","journal-title":"Information Fusion"},{"issue":"7","key":"10.3233\/JIFS-222120_ref20","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1109\/TNNLS.2015.2441735","article-title":"Compound rank-$k$ projections for bilinear analysis","volume":"27","author":"Chang","year":"2015","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"10.3233\/JIFS-222120_ref21","first-page":"1","article-title":"Self-weighted robust LDA for multiclass classification with edge classes","volume":"12","author":"Yan","year":"2020","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"issue":"2","key":"10.3233\/JIFS-222120_ref23","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1214\/18-AOS1709","article-title":"Generalized random forests","volume":"47","author":"Athey","year":"2019","journal-title":"The Annals of Statistics"},{"key":"10.3233\/JIFS-222120_ref24","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.swevo.2018.07.002","article-title":"Global genetic learning particle swarm optimization with diversity enhancement by ring topology","volume":"44","author":"Lin","year":"2019","journal-title":"Swarm and Evolutionary Computation"},{"issue":"16","key":"10.3233\/JIFS-222120_ref27","doi-asserted-by":"crossref","first-page":"7986","DOI":"10.3390\/app12167986","article-title":"A One-Dimensional Convolutional Neural Network (1D-CNN) Based Deep Learning System for Network Intrusion Detection","volume":"12","author":"Qazi","year":"2022","journal-title":"Applied Sciences"},{"key":"10.3233\/JIFS-222120_ref28","doi-asserted-by":"crossref","first-page":"70245","DOI":"10.1109\/ACCESS.2020.2986882","article-title":"AI-IDS: Application of deep learning to real-time Web intrusion detection","volume":"8","author":"Kim","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222120_ref29","doi-asserted-by":"crossref","first-page":"22351","DOI":"10.1109\/ACCESS.2021.3056614","article-title":"Benchmarking of machine learning for anomaly based intrusion detection systems in the CICIDSdataset","volume":"9","author":"Maseer","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-222120_ref30","doi-asserted-by":"crossref","first-page":"108455","DOI":"10.1016\/j.compeleceng.2022.108455","article-title":"The sound of intrusion: A novel network intrusion detection system","volume":"104","author":"Aldarwbi","year":"2022","journal-title":"Computers and Electrical Engineering"},{"key":"10.3233\/JIFS-222120_ref31","doi-asserted-by":"crossref","first-page":"108156","DOI":"10.1016\/j.compeleceng.2022.108156","article-title":"Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system","volume":"102","author":"Ravi","year":"2022","journal-title":"Computers and Electrical Engineering"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-222120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:44:43Z","timestamp":1777455883000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-222120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,4]]},"references-count":23,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-222120","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,4]]}}}