{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:55:01Z","timestamp":1763344501270,"version":"3.45.0"},"reference-count":30,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064930","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T03:54:21Z","timestamp":1749527661000},"page":"3053-3073","source":"Crossref","is-referenced-by-count":0,"title":["AI-Integrated Feature Selection of Intrusion Detection for Both SDN and Traditional Network Architectures Using an Improved Crayfish Optimization Algorithm"],"prefix":"10.32604","volume":"84","author":[{"given":"Hui","family":"Xu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Longtan","family":"Bai","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"13642","DOI":"10.1038\/s41598-025-98604-w","article-title":"A new intrusion detection method using ensemble classification and feature selection","volume":"15","author":"Doost","year":"2025","journal-title":"Sci Rep"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"9831","DOI":"10.1038\/s41598-025-94624-8","article-title":"Advanced intrusion detection in Internet of Things using graph attention networks","volume":"15","author":"Ahanger","year":"2025","journal-title":"Sci Rep"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1016\/j.comnet.2014.10.015","article-title":"Software-defined networking: challenges and research opportunities for future Internet","volume":"75","author":"Hakiri","year":"2014","journal-title":"Comput Netw"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jnca.2017.10.003","article-title":"A survey: hybrid SDN","volume":"100","author":"Sinha","year":"2017","journal-title":"J Netw Comput Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.3390\/s22041396","article-title":"An effective feature selection model using hybrid metaheuristic algorithms for IoT intrusion detection","volume":"22","author":"Kareem","year":"2022","journal-title":"Sensors"},{"key":"ref6","first-page":"1","article-title":"Intrusion detection using normalized mutual information feature selection and parallel quantum genetic algorithm","volume":"18","author":"Ling","year":"2022","journal-title":"Int J Semant Web Inf Syst"},{"key":"ref7","first-page":"5887","article-title":"Improved monarchy butterfly optimization algorithm (IMBO): intrusion detection using mapreduce framework based optimized ANU-Net","volume":"75","author":"Suresh Babu","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref8","first-page":"2677","article-title":"Network intrusion detection based on feature selection and hybrid metaheuristic optimization","volume":"74","author":"Alkanhel","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"418","DOI":"10.3934\/era.2024021","article-title":"Applying modified golden jackal optimization to intrusion detection for software-defined networking","volume":"32","author":"Qiu","year":"2024","journal-title":"Electron Res Arch"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"4515","DOI":"10.3934\/era.2024204","article-title":"Modified artificial rabbits optimization combined with bottlenose dolphin optimizer in feature selection of network intrusion detection","volume":"32","author":"Li","year":"2024","journal-title":"Electron Res Arch"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1919","DOI":"10.1007\/s10462-023-10567-4","article-title":"Crayfish optimization algorithm","volume":"56","author":"Jia","year":"2023","journal-title":"Artif Intell Rev"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"927","DOI":"10.3390\/sym16070927","article-title":"Novel hybrid crayfish optimization algorithm and self-adaptive differential evolution for solving complex optimization problems","volume":"16","author":"Fakhouri","year":"2024","journal-title":"Symmetry"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10462-024-10738-x","article-title":"Modified crayfish optimization algorithm for solving multiple engineering application problems","volume":"57","author":"Jia","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-031-90065-5_7","author":"Grazioso","year":"2025","journal-title":"Applications of evolutionary computation"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"101891","DOI":"10.1016\/j.swevo.2025.101891","article-title":"Strengthened grey wolf optimization algorithms for numerical optimization tasks and AutoML","volume":"94","author":"Chen","year":"2025","journal-title":"Swarm Evol Comput"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"8091","DOI":"10.1007\/s11042-020-10139-6","article-title":"A review on genetic algorithm: past, present, and future","volume":"80","author":"Katoch","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"361","DOI":"10.3390\/biomimetics9060361","article-title":"An improved multi-strategy crayfish optimization algorithm for solving numerical optimization problems","volume":"9","author":"Wang","year":"2024","journal-title":"Biomimetics"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10462-024-11069-7","article-title":"Enhanced crayfish optimization algorithm with differential evolution\u2019s mutation and crossover strategies for global optimization and engineering applications","volume":"58","author":"Maiti","year":"2025","journal-title":"Artif Intell Rev"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"121413","DOI":"10.1016\/j.eswa.2023.121413","article-title":"A nonlinear African vulture optimization algorithm combining Henon chaotic mapping theory and reverse learning competition strategy","volume":"236","author":"Wang","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"21734","DOI":"10.1038\/s41598-024-72279-1","article-title":"Multiple elite strategy enhanced RIME algorithm for 3D UAV path planning","volume":"14","author":"Xie","year":"2024","journal-title":"Sci Rep"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103866","DOI":"10.1016\/j.advengsoft.2025.103866","article-title":"Sub-population evolutionary particle swarm optimization with dynamic fitness-distance balance and elite reverse learning for engineering design problems","volume":"202","author":"Hu","year":"2025","journal-title":"Adv Eng Softw"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1038\/nature06199","article-title":"Revisiting L\u00e9vy flight search patterns of wandering albatrosses, bumblebees and deer","volume":"449","author":"Edwards","year":"2007","journal-title":"Nature"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.asoc.2016.02.018","article-title":"An enhanced particle swarm optimization with levy flight for global optimization","volume":"43","author":"Jensi","year":"2016","journal-title":"Appl Soft Comput"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1504\/IJBIC.2019.100150","article-title":"Cuckoo search algorithm with different distribution strategy","volume":"13","author":"Tang","year":"2019","journal-title":"Int J Bio Inspired Comput"},{"key":"ref25","first-page":"65","article-title":"Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets\u2014a review paper","volume":"11","author":"Rama Devi","year":"2019","journal-title":"Int J Comput Sci Inf Technol"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"29575","DOI":"10.1109\/ACCESS.2020.2972627","article-title":"BAT: deep learning methods on network intrusion detection using NSL-KDD dataset","volume":"8","author":"Su","year":"2020","journal-title":"IEEE Access"},{"key":"ref27","series-title":"2015 Military Communications and Information Systems Conference (MilCIS)","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015 Nov 10\u201312"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.3390\/sym12101666","article-title":"An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system","volume":"12","author":"Al-Daweri","year":"2020","journal-title":"Symmetry"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","article-title":"InSDN: a novel SDN intrusion dataset","volume":"8","author":"Elsayed","year":"2020","journal-title":"IEEE Access"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"342","DOI":"10.3390\/drones6110342","article-title":"An intrusion detection model for drone communication network in SDN environment","volume":"6","author":"Kou","year":"2022","journal-title":"Drones"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_64930\/TSP_CMC_64930.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:50:37Z","timestamp":1763344237000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064930","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}