{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:13:34Z","timestamp":1758269614622,"version":"3.40.5"},"reference-count":33,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7,1]]},"abstract":"<p>Intrusion detection systems (IDS's) play a vital role in network security to prevent the unauthorized use of data over networks. The feature selection approach is an important paradigm to strengthen IDS systems. In this article, a reinforced firefly-based feature selection model is proposed. This model utilizes the firefly inspired optimizer to select the features and it combines filter-based and wrapper-based approaches to boost the optimizer approach of the significant feature subset. In addition to that, novel classifiers are used to validate the efficiency of the selected subset. The proposed work is tested on the KDD Cup99 data sets which include 41 different features. Experimental results convey that the proposed work outperforms in terms of better detection accuracy, FPR and F-score. Also, it achieves better classification accuracy and less computational complexity compared to other algorithms.<\/p>","DOI":"10.4018\/ijghpc.2020070105","type":"journal-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T14:10:56Z","timestamp":1592921456000},"page":"68-87","source":"Crossref","is-referenced-by-count":3,"title":["RFA Reinforced Firefly Algorithm to Identify Optimal Feature Subsets for Network IDS"],"prefix":"10.4018","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0734-3423","authenticated-orcid":true,"given":"R.","family":"Rajakumar","sequence":"first","affiliation":[{"name":"Madanapalle Institute of Technology and Science, Madanapalle, India"}]},{"given":"K.","family":"Dinesh","sequence":"additional","affiliation":[{"name":"Madanapalle Institute of Technology and Science, Madanapalle, India"}]},{"given":"Ankur","family":"Dumka","sequence":"additional","affiliation":[{"name":"Women Institue of Technology, Dehradun, India"}]},{"family":"Jayakumar L","sequence":"additional","affiliation":[{"name":"Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, Chennai, India"}]}],"member":"2432","reference":[{"key":"IJGHPC.2020070105-0","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0527-8"},{"issue":"19","key":"IJGHPC.2020070105-1","first-page":"57","article-title":"Denial-of-service, probing & remote to user (R2L) attack detection using genetic algorithm.","volume":"60","author":"S.Paliwal","year":"2012","journal-title":"International Journal of Computers and Applications"},{"key":"IJGHPC.2020070105-2","unstructured":"Sabhnani, M., & Serpen, G. (2003). Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. In Proceedings of the MLMTA (pp. 209-215). Academic Press."},{"issue":"8","key":"IJGHPC.2020070105-3","first-page":"75","article-title":"Data mining in intrusion detection: A comparative study of methods, types and data sets.","volume":"5","author":"C.Azad","year":"2013","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"IJGHPC.2020070105-4","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00364-9"},{"key":"IJGHPC.2020070105-5","unstructured":"NSL-KDD data set. (n.d.). Retrieved from https:\/\/github.com\/defcom17\/NSL_KDD"},{"key":"IJGHPC.2020070105-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"IJGHPC.2020070105-7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"IJGHPC.2020070105-8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2786584"},{"key":"IJGHPC.2020070105-9","doi-asserted-by":"crossref","unstructured":"Peng, H., Long, F., & Ding, C. (2005). Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis & Machine Intelligence, (8), 1226-1238.","DOI":"10.1109\/TPAMI.2005.159"},{"key":"IJGHPC.2020070105-10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.142"},{"key":"IJGHPC.2020070105-11","first-page":"1","article-title":"A new hybrid approach for intrusion detection using machine learning methods.","author":"\u00dc.\u00c7avu\u015fo\u011flu","year":"2019","journal-title":"Applied Intelligence"},{"key":"IJGHPC.2020070105-12","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1010-4"},{"key":"IJGHPC.2020070105-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"IJGHPC.2020070105-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"IJGHPC.2020070105-15","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-284-5_11"},{"key":"IJGHPC.2020070105-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.04.040"},{"key":"IJGHPC.2020070105-17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820092"},{"key":"IJGHPC.2020070105-18","doi-asserted-by":"publisher","DOI":"10.1109\/SKIMA.2014.7083539"},{"key":"IJGHPC.2020070105-19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810198"},{"issue":"3","key":"IJGHPC.2020070105-20","first-page":"420","article-title":"Feature Selection for Intrusion Detection System Using Ant Colony Optimization.","volume":"18","author":"M. H.Aghdam","year":"2016","journal-title":"International Journal of Network Security"},{"key":"IJGHPC.2020070105-21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2013.6967147"},{"issue":"3","key":"IJGHPC.2020070105-22","first-page":"221","article-title":"A Novel Node Selection Function for Multilevel Hierarchical Clustering Scheme in Cooperative Cognitive Radio Networks.","volume":"9","author":"L.Jayakumar","year":"2016","journal-title":"International Journal of Control Theory and Application"},{"key":"IJGHPC.2020070105-23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.10.030"},{"key":"IJGHPC.2020070105-24","doi-asserted-by":"crossref","unstructured":"Yang, X. S. (2010). Firefly algorithm, stochastic test functions and design optimisation.","DOI":"10.1504\/IJBIC.2010.032124"},{"key":"IJGHPC.2020070105-25","doi-asserted-by":"publisher","DOI":"10.1002\/9780470640425.ch17"},{"key":"IJGHPC.2020070105-26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.005"},{"key":"IJGHPC.2020070105-27","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"IJGHPC.2020070105-28","unstructured":"NSL-KDD data set. (n.d.). Retrieved from https:\/\/github.com\/defcom17\/NSL_KDD\u201d"},{"key":"IJGHPC.2020070105-29","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2016.7881798"},{"issue":"10","key":"IJGHPC.2020070105-30","article-title":"Feature selection using particle swarm optimization in intrusion detection.","volume":"11","author":"I.Ahmad","year":"2015","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"IJGHPC.2020070105-31","doi-asserted-by":"publisher","DOI":"10.1023\/B:COAP.0000026884.66338.df"},{"key":"IJGHPC.2020070105-32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011215321374"}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=257225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:54:00Z","timestamp":1651881240000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJGHPC.2020070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijghpc.2020070105","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"type":"print","value":"1938-0259"},{"type":"electronic","value":"1938-0267"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}