{"id":"https://openalex.org/W4410702689","doi":"https://doi.org/10.1007/s12083-024-01859-9","title":"An enhanced attention and dilated convolution-based ensemble model for network intrusion detection system against adversarial evasion attacks","display_name":"An enhanced attention and dilated convolution-based ensemble model for network intrusion detection system against adversarial evasion attacks","publication_year":2025,"publication_date":"2025-05-24","ids":{"openalex":"https://openalex.org/W4410702689","doi":"https://doi.org/10.1007/s12083-024-01859-9"},"language":"en","primary_location":{"id":"doi:10.1007/s12083-024-01859-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12083-024-01859-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12083-024-01859-9.pdf","source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s12083-024-01859-9.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093220152","display_name":"Omer Fawzi Awad","orcid":"https://orcid.org/0000-0002-8424-7769"},"institutions":[{"id":"https://openalex.org/I72539421","display_name":"University of Tikrit","ror":"https://ror.org/01zfzax10","country_code":"IQ","type":"education","lineage":["https://openalex.org/I72539421"]},{"id":"https://openalex.org/I42317466","display_name":"Alt\u0131nba\u015f University","ror":"https://ror.org/0145w8333","country_code":"TR","type":"education","lineage":["https://openalex.org/I42317466"]}],"countries":["IQ","TR"],"is_corresponding":true,"raw_author_name":"Omer Fawzi Awad","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Altinbas University, Mahmutbey, Istanbul, 34217, Turkey","Medicin College, Tikrit University, Tikrit, Saladin Governorate, Iraq"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Altinbas University, Mahmutbey, Istanbul, 34217, Turkey","institution_ids":["https://openalex.org/I42317466"]},{"raw_affiliation_string":"Medicin College, Tikrit University, Tikrit, Saladin Governorate, Iraq","institution_ids":["https://openalex.org/I72539421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069211705","display_name":"Mesut \u00c7ev\u0131k","orcid":"https://orcid.org/0000-0003-0299-9076"},"institutions":[{"id":"https://openalex.org/I42317466","display_name":"Alt\u0131nba\u015f University","ror":"https://ror.org/0145w8333","country_code":"TR","type":"education","lineage":["https://openalex.org/I42317466"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Mesut \u00c7evik","raw_affiliation_strings":["Electrical and Electronics Engineering, Altinbas University, Istanbul, 34217, Turkey"],"affiliations":[{"raw_affiliation_string":"Electrical and Electronics Engineering, Altinbas University, Istanbul, 34217, Turkey","institution_ids":["https://openalex.org/I42317466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065370490","display_name":"Hameed Mutlag Farhan","orcid":"https://orcid.org/0000-0001-7845-3892"},"institutions":[{"id":"https://openalex.org/I42317466","display_name":"Alt\u0131nba\u015f University","ror":"https://ror.org/0145w8333","country_code":"TR","type":"education","lineage":["https://openalex.org/I42317466"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Hameed Mutlag Farhan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Altinbas University, Mahmutbey, Istanbul, 34217, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Altinbas University, Mahmutbey, Istanbul, 34217, Turkey","institution_ids":["https://openalex.org/I42317466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093220152"],"corresponding_institution_ids":["https://openalex.org/I42317466","https://openalex.org/I72539421"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":{"value":2790,"currency":"EUR","value_usd":3590},"fwci":3.281,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.92154423,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"18","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.68400639295578},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6656767725944519},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6656116247177124},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6528624296188354},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.5597854852676392},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.5003125667572021},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33663660287857056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3217267394065857},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.12083679437637329},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.06282329559326172},{"id":"https://openalex.org/keywords/immunology","display_name":"Immunology","score":0.061580389738082886}],"concepts":[{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.68400639295578},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6656767725944519},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6656116247177124},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6528624296188354},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.5597854852676392},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.5003125667572021},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33663660287857056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3217267394065857},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.12083679437637329},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.06282329559326172},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.061580389738082886},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12083-024-01859-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12083-024-01859-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12083-024-01859-9.pdf","source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s12083-024-01859-9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12083-024-01859-9","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12083-024-01859-9.pdf","source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4410702689.pdf","grobid_xml":"https://content.openalex.org/works/W4410702689.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W2904045126","https://openalex.org/W2929831570","https://openalex.org/W3012988996","https://openalex.org/W3017217726","https://openalex.org/W3038270519","https://openalex.org/W3085382268","https://openalex.org/W3106681699","https://openalex.org/W3162883843","https://openalex.org/W3172336096","https://openalex.org/W3206546735","https://openalex.org/W3214771494","https://openalex.org/W3214977413","https://openalex.org/W3217164279","https://openalex.org/W4283696246","https://openalex.org/W4283753393","https://openalex.org/W4285193671","https://openalex.org/W4293386766","https://openalex.org/W4306180880","https://openalex.org/W4309774299","https://openalex.org/W4310863204","https://openalex.org/W4311421536","https://openalex.org/W4319754153","https://openalex.org/W4321484315","https://openalex.org/W4323545679","https://openalex.org/W4323830151","https://openalex.org/W4353004226","https://openalex.org/W4377028392","https://openalex.org/W4377693179","https://openalex.org/W4381322723","https://openalex.org/W4383196772","https://openalex.org/W4384434495","https://openalex.org/W4385973175","https://openalex.org/W4386601358","https://openalex.org/W4386760178","https://openalex.org/W4387427776","https://openalex.org/W4387539439","https://openalex.org/W4387613423","https://openalex.org/W4387806828","https://openalex.org/W4390610507","https://openalex.org/W4393164364","https://openalex.org/W4393357391","https://openalex.org/W4393932122","https://openalex.org/W4394855752","https://openalex.org/W4399075400","https://openalex.org/W4401567590"],"related_works":["https://openalex.org/W2808001300","https://openalex.org/W1548771250","https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538"],"abstract_inverted_index":{"Abstract":[0],"Network":[1,169,186],"Intrusion":[2],"Detection":[3],"System":[4],"(NIDS)":[5],"is":[6,63,109,122,171,226,272],"a":[7],"system":[8],"for":[9,212],"recognizing":[10],"suspicious":[11],"activities":[12],"in":[13,27,86,95,111],"the":[14,28,51,84,88,119,128,137,140,144,150,157,175,178,203,213,219,229,236,255,259,268,275,279,283,295],"network":[15],"traffic.":[16],"Numerous":[17],"machines":[18],"learning":[19],"and":[20,42,60,164,193,231,254,264],"deep":[21,89,105,238],"learning-aided":[22],"IDSs":[23],"have":[24,79],"been":[25],"implemented":[26,172,284],"past,":[29],"however,":[30],"most":[31],"of":[32,50,139,258],"these":[33],"techniques":[34,53],"face":[35],"challenges":[36],"based":[37,167],"on":[38,67],"class":[39],"imbalance":[40],"issues":[41],"high":[43],"false":[44],"positive":[45],"rates.":[46],"Other":[47],"primary":[48],"problems":[49],"conventional":[52,250,276],"are":[54,133,199,210,247,262],"their":[55,71],"vulnerability":[56],"to":[57,135,173,201,217,232,274],"adversarial":[58,100,243,287],"attacks":[59,289],"also":[61],"there":[62],"no":[64],"analysis":[65],"done":[66],"how":[68,234],"NIDS":[69,107,240,285],"sustain":[70],"performance":[72],"over":[73],"various":[74],"attacks.":[75],"Moreover,":[76],"recent":[77],"studies":[78],"demonstrated":[80],"that":[81,155,282],"while":[82],"handling":[83],"attackers":[85],"real-time,":[87],"learning-based":[90,106,239],"IDS":[91],"shows":[92],"slight":[93],"variations":[94],"accuracy.":[96],"To":[97,142],"defend":[98],"against":[99,242,249,286],"evasion":[101,244,288],"attacks,":[102],"an":[103,162],"enhanced":[104],"model":[108,261],"designed":[110],"this":[112,115,147],"work.":[113],"For":[114],"purpose,":[116],"at":[117],"first,":[118],"required":[120],"data":[121],"collected":[123,129],"from":[124,177,207],"available":[125],"websites.":[126],"From":[127],"data,":[130],"effective":[131,292],"features":[132,159],"extracted":[134],"improve":[136],"accuracy":[138,253],"process.":[141],"select":[143],"optimal":[145,179],"features,":[146],"work":[148],"employed":[149],"Improved":[151],"Cheetah":[152],"Optimizer":[153],"(ICO)":[154],"eliminates":[156],"unwanted":[158],"efficiently.":[160],"Further,":[161],"Attention":[163],"Dilated":[165],"Convolution":[166],"Ensemble":[168],"(ADCEN)":[170],"detect":[174],"intrusions":[176],"features.":[180],"The":[181,205,252],"Deep":[182],"Temporal":[183],"Convolutional":[184],"Neural":[185],"(DTCN),":[187],"Long":[188],"Short":[189],"Term":[190],"Memory":[191],"(LSTM),":[192],"Gated":[194],"Recurrent":[195],"Unit":[196],"(GRU)":[197],"models":[198],"integrated":[200],"develop":[202],"ADCEN.":[204],"outcomes":[206],"each":[208],"technique":[209],"considered":[211],"fuzzy":[214],"ranking":[215],"mechanism":[216],"generate":[218],"final":[220],"detected":[221],"outcome.":[222],"Thus,":[223,278],"recognized":[224],"intrusion":[225],"attained":[227,290],"as":[228],"outcome":[230],"demonstrate":[233],"well":[235],"recommended":[237,260],"defends":[241],"assaults,":[245],"experiments":[246],"conducted":[248],"models.":[251],"FPR":[256],"values":[257],"95":[263],"4.9":[265],"when":[266],"considering":[267],"first":[269],"dataset":[270],"which":[271],"superior":[273],"techniques.":[277],"findings":[280],"indicated":[281],"more":[291],"solutions":[293],"than":[294],"baseline":[296],"approaches.":[297]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
