{"id":"https://openalex.org/W4415970956","doi":"https://doi.org/10.1109/access.2025.3629761","title":"Prompt Engineering-Based Network Intrusion Detection System","display_name":"Prompt Engineering-Based Network Intrusion Detection System","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415970956","doi":"https://doi.org/10.1109/access.2025.3629761"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3629761","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3629761","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3629761","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000255643","display_name":"Sunit Kumar Nandi","orcid":"https://orcid.org/0000-0003-2100-269X"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sunit Kumar Nandi","raw_affiliation_strings":["Indian Institute of Technology Guwahati, Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078569652","display_name":"Ritesh Ratti","orcid":null},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]},{"id":"https://openalex.org/I86613570","display_name":"Universidad Panamericana","ror":"https://ror.org/01n1q0h77","country_code":"MX","type":"education","lineage":["https://openalex.org/I86613570"]}],"countries":["IN","MX"],"is_corresponding":false,"raw_author_name":"Ritesh Ratti","raw_affiliation_strings":["Temus Private Ltd., Mapletree Business City, Pasir Panjang Rd, Singapore","Indian Institute of Technology Guwahati, Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"Temus Private Ltd., Mapletree Business City, Pasir Panjang Rd, Singapore","institution_ids":["https://openalex.org/I86613570"]},{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101512376","display_name":"Sanasam Ranbir Singh","orcid":"https://orcid.org/0000-0003-0484-2144"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanasam Ranbir Singh","raw_affiliation_strings":["Indian Institute of Technology Guwahati, Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053883070","display_name":"Sukumar Nandi","orcid":"https://orcid.org/0000-0002-5869-1057"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sukumar Nandi","raw_affiliation_strings":["Indian Institute of Technology Guwahati, Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000255643"],"corresponding_institution_ids":["https://openalex.org/I1317621060"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.441,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.95141103,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"13","issue":null,"first_page":"190859","last_page":"190871"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6297000050544739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.6297000050544739,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.07209999859333038,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.029200000688433647,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7581999897956848},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6000000238418579},{"id":"https://openalex.org/keywords/file-transfer-protocol","display_name":"File Transfer Protocol","score":0.5555999875068665},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4742000102996826},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.4542999863624573},{"id":"https://openalex.org/keywords/basis","display_name":"Basis (linear algebra)","score":0.3564999997615814},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.34880000352859497}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8841999769210815},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7581999897956848},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6000000238418579},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5958999991416931},{"id":"https://openalex.org/C169485995","wikidata":"https://www.wikidata.org/wiki/Q42283","display_name":"File Transfer Protocol","level":3,"score":0.5555999875068665},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4742000102996826},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.4542999863624573},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42719998955726624},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.3564999997615814},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3522999882698059},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.34880000352859497},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.32679998874664307},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.3073999881744385},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.28630000352859497},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.2653000056743622},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2596000134944916},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3629761","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3629761","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7d361fdde5fd4fa38c5083e1b85a54fb","is_oa":true,"landing_page_url":"https://doaj.org/article/7d361fdde5fd4fa38c5083e1b85a54fb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 190859-190871 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3629761","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3629761","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advancements":[1],"in":[2,59,88],"generative":[3],"AI":[4],"and":[5,35,106,120,133],"evolution":[6],"of":[7,28,32,47,80],"Large":[8],"Language":[9],"Models":[10],"have":[11],"opened":[12],"up":[13],"new":[14,38],"paths":[15],"to":[16],"explore":[17],"them":[18],"for":[19,56,78,111,129],"various":[20,108,116],"applications":[21],"including":[22],"network":[23,60,74,84,104],"attack":[24],"detection.":[25],"LLMs\u2019":[26],"capability":[27],"learning":[29],"the":[30,45,54,134],"distribution":[31,43],"training":[33],"data":[34],"subsequently":[36],"generating":[37],"content":[39],"based":[40,73,98,142],"on":[41,44,99,123],"this":[42,66],"basis":[46],"prompts":[48],"supplied":[49],"as":[50,63],"input":[51],"has":[52],"paved":[53],"way":[55],"predicting":[57],"anomalies":[58],"features":[61,86,100],"represented":[62,87],"text.":[64],"In":[65],"paper,":[67],"we":[68],"propose":[69],"an":[70],"LLM":[71,112],"prompt-engineering":[72],"intrusion":[75],"detection":[76,79],"method":[77,93,143],"attacks":[81],"from":[82,102],"raw":[83,103],"packet":[85],"text":[89],"form.":[90],"The":[91],"proposed":[92,139],"uses":[94,107],"multiple":[95],"extracted":[96],"views":[97],"derived":[101],"packets":[105],"prompt":[109,140],"formats":[110],"inferencing.":[113],"We":[114],"perform":[115],"experiments":[117],"using":[118],"packet-level":[119],"flow-level":[121],"information":[122],"a":[124],"recent":[125],"dataset":[126],"i.e.":[127],"CICIDS2018":[128],"FTP":[130],"Bruteforce":[131],"attack,":[132],"results":[135],"show":[136],"that":[137],"our":[138],"engineering":[141],"performs":[144],"better":[145],"than":[146],"current":[147],"state-of-the-art":[148],"techniques.":[149]},"counts_by_year":[{"year":2026,"cited_by_count":3}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-11-06T00:00:00"}
