  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/4038</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Feature Selection Techniques in Intrusion Detection  Systems: A Review</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Middle Technical University, Iraq</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Omar</given_name>
    <surname>Omar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">General Directorate of Education Anbar, 31001, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Obaid</given_name>
    <surname>Salim</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Engineering Techniques, College of Technical Engineering, University of Al Maarif, Al Anbar, 31001, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Omar Muthanna</given_name>
    <surname>Khudhur</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Computer Networks Systems, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Shokhan M. Al</given_name>
    <surname>Al-Barzinji</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">College of Computer Science and Information Technology, University of Anbar, Anbar, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Farah Maath</given_name>
    <surname>Jasem</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Intrusion detection has garnered significant attention as researchers strive to develop sophisticated models characterized by their high accuracy levels. However, the persistent challenge lies in creating reliable and effective intrusion detection systems capable of managing vast datasets under dynamic, real-time conditions. The effectiveness of such systems largely depends on the chosen detection methodologies, specifically the feature selection processes and the application of machine learning techniques. This paper offers a comprehensive review of feature selection methods employed in the realm of intrusion detection research. It examines various dimensionality reduction strategies, followed by a systematic classification of feature selection techniques to assess their impact on the training phase and subsequent detection efficacy. The focus was on the wrapper, filter feature selection methods, where the methods used were analysed, and their strengths and weaknesses were revealed. The identification and selection of the most pertinent features have been shown to significantly enhance the detection performance, not only in terms of accuracy but also in reducing computational demands, underscoring its critical importance in the architecture of intrusion detection systems.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2026</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2026</year>
  </publication_date>
  <pages>
   <first_page>97</first_page>
   <last_page>112</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.170208</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/4038</resource>
  </doi_data>
 </journal_article>
</journal>
