{"id":"https://openalex.org/W7118182704","doi":"https://doi.org/10.1109/access.2026.3651187","title":"Explainable AI-Driven Intrusion Detection System for DoS Attack Classification Using Deep Learning and Optimization Techniques","display_name":"Explainable AI-Driven Intrusion Detection System for DoS Attack Classification Using Deep Learning and Optimization Techniques","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118182704","doi":"https://doi.org/10.1109/access.2026.3651187"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3651187","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651187","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3651187","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121967888","display_name":"Sneha Ghosh","orcid":null},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sneha Ghosh","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering &#x0026; Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering &#x0026; Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032536567","display_name":"Raman Kumar Goyal","orcid":"https://orcid.org/0000-0002-9735-6040"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Raman Kumar Goyal","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering &#x0026; Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering &#x0026; Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025744256","display_name":"Kuntal Chowdhury","orcid":"https://orcid.org/0000-0003-0726-751X"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kuntal Chowdhury","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar Institute of Engineering &#x0026; Technology, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar Institute of Engineering &#x0026; Technology, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5121967888"],"corresponding_institution_ids":["https://openalex.org/I162030827"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":48.0583,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.98876548,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"14","issue":null,"first_page":"5618","last_page":"5642"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8737000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8737000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.015200000256299973,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.012400000356137753,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5866000056266785},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5131999850273132},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5091999769210815},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4514999985694885},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4198000133037567},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.40310001373291016},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.39419999718666077},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3831999897956848},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.37059998512268066}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8655999898910522},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7476000189781189},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5866000056266785},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5461000204086304},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5131999850273132},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5091999769210815},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4514999985694885},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4198000133037567},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.39419999718666077},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3919000029563904},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3831999897956848},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.37059998512268066},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.34389999508857727},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.3327000141143799},{"id":"https://openalex.org/C66905080","wikidata":"https://www.wikidata.org/wiki/Q17005494","display_name":"Binary classification","level":3,"score":0.32839998602867126},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.326200008392334},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.30320000648498535},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.29170000553131104},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.2906000018119812},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.27309998869895935},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.271699994802475},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C97385483","wikidata":"https://www.wikidata.org/wiki/Q16954980","display_name":"Deep belief network","level":3,"score":0.257999986410141},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C34872919","wikidata":"https://www.wikidata.org/wiki/Q7092302","display_name":"One-class classification","level":3,"score":0.2522999942302704},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3651187","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651187","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3651187","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651187","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W3157688629","https://openalex.org/W3160455160","https://openalex.org/W3162620147","https://openalex.org/W4206931805","https://openalex.org/W4280610250","https://openalex.org/W4280652331","https://openalex.org/W4289913113","https://openalex.org/W4297538900","https://openalex.org/W4323767081","https://openalex.org/W4327750468","https://openalex.org/W4367294474","https://openalex.org/W4367309662","https://openalex.org/W4382561994","https://openalex.org/W4387880013","https://openalex.org/W4388141109","https://openalex.org/W4388188747","https://openalex.org/W4388969448","https://openalex.org/W4389469247","https://openalex.org/W4391099793","https://openalex.org/W4391547729","https://openalex.org/W4391741433","https://openalex.org/W4392120324","https://openalex.org/W4392347784","https://openalex.org/W4392529044","https://openalex.org/W4392694748","https://openalex.org/W4393199008","https://openalex.org/W4393210626","https://openalex.org/W4394744824","https://openalex.org/W4396768380","https://openalex.org/W4399887369","https://openalex.org/W4400647899","https://openalex.org/W4400737507","https://openalex.org/W4401326315","https://openalex.org/W4402170787","https://openalex.org/W4402441855","https://openalex.org/W4402810379","https://openalex.org/W4402893237","https://openalex.org/W4403209235","https://openalex.org/W4403605016","https://openalex.org/W4405263368","https://openalex.org/W4405311141","https://openalex.org/W4406028214","https://openalex.org/W4406181061","https://openalex.org/W4406230518","https://openalex.org/W4406342941","https://openalex.org/W4406405353","https://openalex.org/W4406610366","https://openalex.org/W4406886250","https://openalex.org/W4407097759","https://openalex.org/W4407158500","https://openalex.org/W4407317775","https://openalex.org/W4407449879","https://openalex.org/W4407782765","https://openalex.org/W4407876759","https://openalex.org/W4407906826","https://openalex.org/W4408455125","https://openalex.org/W4408504401","https://openalex.org/W4408902355","https://openalex.org/W4410358753","https://openalex.org/W4410539198"],"related_works":[],"abstract_inverted_index":{"An":[0,86],"Intrusion":[1],"Detection":[2],"System":[3],"(IDS)":[4],"is":[5,81,110,132,186],"crucial":[6],"for":[7,83],"strengthening":[8],"cyber":[9],"resilience,":[10],"particularly":[11],"in":[12,155],"detecting":[13],"and":[14,37,61,116,153,161,178,195,205,208],"mitigating":[15],"Denial":[16],"of":[17,40,68,118,138,180,200],"Service":[18],"(DoS)":[19],"occurrences":[20],"that":[21,57],"compromise":[22],"network":[23,77,109,119],"operations.":[24],"However,":[25],"current":[26,214],"IDS":[27,56],"models":[28],"face":[29],"challenges":[30],"such":[31],"as":[32],"class":[33],"imbalance,":[34],"redundant":[35],"features,":[36],"a":[38],"lack":[39],"interpretability.":[41],"To":[42,149],"address":[43],"the":[44,66,93,114,136,139,151,176,181,213],"above":[45],"issues,":[46],"this":[47],"research":[48],"proposes":[49],"an":[50],"Explainable":[51],"Artificial":[52],"Intelligence":[53],"(XAI)":[54],"driven":[55],"integrates":[58],"deep":[59,104],"learning":[60],"optimization":[62,130],"methods":[63],"to":[64,112,134],"improve":[65],"classification":[67,147,198],"DoS":[69],"attacks.":[70],"A":[71,100],"reweighted":[72],"auxiliary":[73],"classifier":[74],"generative":[75],"adversarial":[76],"with":[78,88],"gradient":[79],"penalty":[80],"employed":[82,133],"data":[84],"augmentation.":[85],"EfficientNet-B0":[87],"hybrid":[89],"attention":[90,103],"modules":[91],"enhances":[92],"feature":[94,171],"extraction":[95],"process,":[96],"identifying":[97],"critical":[98],"patterns.":[99],"multiplicative":[101],"Luong":[102],"residual":[105],"multiscale":[106],"convolutional":[107],"neural":[108],"utilized":[111],"enhance":[113,150],"robustness":[115],"accuracy":[117],"traffic":[120],"sample":[121],"categorization":[122],"by":[123],"extracting":[124],"context":[125],"features.":[126],"The":[127,183],"enhanced":[128],"starfish":[129],"algorithm":[131],"tune":[135],"hyperparameters":[137],"proposed":[140,184],"method,":[141],"minimizing":[142],"computational":[143],"complexity":[144],"while":[145],"maximizing":[146],"accuracy.":[148],"transparency":[152,177],"trust":[154],"model":[156],"decisions,":[157],"shapely":[158],"additive":[159],"explanations":[160,165],"local":[162],"interpretable":[163],"model-agnostic":[164],"are":[166],"implemented,":[167],"offering":[168],"insight":[169],"into":[170],"importance,":[172],"thereby":[173],"improving":[174],"both":[175],"reliability":[179],"IDS.":[182],"method":[185],"executed":[187],"on":[188],"five":[189],"datasets:":[190],"NSL-KDD,":[191],"CSE-CIC-IDS2018,":[192],"CCIDS2019,":[193],"KDD-Cup99,":[194],"UNSW-NB15,":[196],"attaining":[197],"accuracies":[199],"99.99%,":[201],"99.96%,":[202],"99.97%,":[203],"99.96%":[204],"99.95%,":[206],"respectively,":[207],"it":[209],"performs":[210],"better":[211],"than":[212],"techniques.":[215]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-05T00:00:00"}
