{"id":"https://openalex.org/W4392905454","doi":"https://doi.org/10.1109/acit58888.2023.10453733","title":"AI-Powered Network Intrusion Detection: A New Frontier in Cybersecurity","display_name":"AI-Powered Network Intrusion Detection: A New Frontier in Cybersecurity","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4392905454","doi":"https://doi.org/10.1109/acit58888.2023.10453733"},"language":"en","primary_location":{"id":"doi:10.1109/acit58888.2023.10453733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit58888.2023.10453733","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 24th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013655514","display_name":"Ali Rachini","orcid":"https://orcid.org/0000-0003-4675-0109"},"institutions":[{"id":"https://openalex.org/I189998669","display_name":"Holy Spirit University of Kaslik","ror":"https://ror.org/05g06bh89","country_code":"LB","type":"education","lineage":["https://openalex.org/I189998669"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Ali Rachini","raw_affiliation_strings":["Holy Spirit University of Kaslik (USEK),Department of Computer Science and Information Technology,Jounieh,Lebanon","Department of Computer Science and Information Technology, Holy Spirit University of Kaslik (USEK), Jounieh, Lebanon"],"affiliations":[{"raw_affiliation_string":"Holy Spirit University of Kaslik (USEK),Department of Computer Science and Information Technology,Jounieh,Lebanon","institution_ids":["https://openalex.org/I189998669"]},{"raw_affiliation_string":"Department of Computer Science and Information Technology, Holy Spirit University of Kaslik (USEK), Jounieh, Lebanon","institution_ids":["https://openalex.org/I189998669"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048049726","display_name":"Charbel Fares","orcid":"https://orcid.org/0000-0002-4741-752X"},"institutions":[{"id":"https://openalex.org/I189998669","display_name":"Holy Spirit University of Kaslik","ror":"https://ror.org/05g06bh89","country_code":"LB","type":"education","lineage":["https://openalex.org/I189998669"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Charbel Fares","raw_affiliation_strings":["Holy Spirit University of Kaslik (USEK),Department of Computer Science and Information Technology,Jounieh,Lebanon","Department of Computer Science and Information Technology, Holy Spirit University of Kaslik (USEK), Jounieh, Lebanon"],"affiliations":[{"raw_affiliation_string":"Holy Spirit University of Kaslik (USEK),Department of Computer Science and Information Technology,Jounieh,Lebanon","institution_ids":["https://openalex.org/I189998669"]},{"raw_affiliation_string":"Department of Computer Science and Information Technology, Holy Spirit University of Kaslik (USEK), Jounieh, Lebanon","institution_ids":["https://openalex.org/I189998669"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080399729","display_name":"Maroun Abi Assaf","orcid":"https://orcid.org/0009-0001-6339-5164"},"institutions":[{"id":"https://openalex.org/I189998669","display_name":"Holy Spirit University of Kaslik","ror":"https://ror.org/05g06bh89","country_code":"LB","type":"education","lineage":["https://openalex.org/I189998669"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Maroun Abi Assaf","raw_affiliation_strings":["Holy Spirit University of Kaslik (USEK),Department of Computer Science and Information Technology,Jounieh,Lebanon","Department of Computer Science and Information Technology, Holy Spirit University of Kaslik (USEK), Jounieh, Lebanon"],"affiliations":[{"raw_affiliation_string":"Holy Spirit University of Kaslik (USEK),Department of Computer Science and Information Technology,Jounieh,Lebanon","institution_ids":["https://openalex.org/I189998669"]},{"raw_affiliation_string":"Department of Computer Science and Information Technology, Holy Spirit University of Kaslik (USEK), Jounieh, Lebanon","institution_ids":["https://openalex.org/I189998669"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094179224","display_name":"Buroog Jamal","orcid":null},"institutions":[{"id":"https://openalex.org/I3131779051","display_name":"Iraqi University","ror":"https://ror.org/01wfhkb67","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3131779051"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Buroog Jamal","raw_affiliation_strings":["Iraqi Airways,Baghdad,Iraq","Iraqi Airways, Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Iraqi Airways,Baghdad,Iraq","institution_ids":["https://openalex.org/I3131779051"]},{"raw_affiliation_string":"Iraqi Airways, Baghdad, Iraq","institution_ids":["https://openalex.org/I3131779051"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109225807","display_name":"Rida Khatoun","orcid":null},"institutions":[{"id":"https://openalex.org/I12356871","display_name":"T\u00e9l\u00e9com Paris","ror":"https://ror.org/01naq7912","country_code":"FR","type":"education","lineage":["https://openalex.org/I12356871","https://openalex.org/I205703379","https://openalex.org/I4210145102"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Rida Khatoun","raw_affiliation_strings":["Telecom ParisTech,Paris,France","Telecom ParisTech, Paris, France"],"affiliations":[{"raw_affiliation_string":"Telecom ParisTech,Paris,France","institution_ids":["https://openalex.org/I12356871"]},{"raw_affiliation_string":"Telecom ParisTech, Paris, France","institution_ids":["https://openalex.org/I12356871"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013655514"],"corresponding_institution_ids":["https://openalex.org/I189998669"],"apc_list":null,"apc_paid":null,"fwci":1.0014,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78467678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/frontier","display_name":"Frontier","score":0.7820497751235962},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7508524060249329},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6780205368995667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6427064538002014},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4841669201850891},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.48133501410484314},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.44542351365089417},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3586573004722595}],"concepts":[{"id":"https://openalex.org/C2778571376","wikidata":"https://www.wikidata.org/wiki/Q1355821","display_name":"Frontier","level":2,"score":0.7820497751235962},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7508524060249329},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6780205368995667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6427064538002014},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4841669201850891},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.48133501410484314},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.44542351365089417},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3586573004722595},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit58888.2023.10453733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit58888.2023.10453733","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 24th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1472067","https://openalex.org/W2056132907","https://openalex.org/W2191495690","https://openalex.org/W2979354191","https://openalex.org/W3001567147","https://openalex.org/W3048313003","https://openalex.org/W3101894954","https://openalex.org/W3105682467","https://openalex.org/W3126533776","https://openalex.org/W3128756376","https://openalex.org/W3133543405","https://openalex.org/W3141537781","https://openalex.org/W3148181069","https://openalex.org/W3151800125","https://openalex.org/W3157450643","https://openalex.org/W4206198596","https://openalex.org/W4211114749","https://openalex.org/W4220957574","https://openalex.org/W4244895750","https://openalex.org/W6607714477"],"related_works":["https://openalex.org/W2133389611","https://openalex.org/W2376886931","https://openalex.org/W2351448539","https://openalex.org/W2061466315","https://openalex.org/W1495178644","https://openalex.org/W2383892082","https://openalex.org/W2185594426","https://openalex.org/W2374845301","https://openalex.org/W2357927603","https://openalex.org/W4200619826"],"abstract_inverted_index":{"Intrusion":[0,60],"Detection":[1,61],"Systems":[2,62],"(IDS)":[3],"constitute":[4],"a":[5,77,138],"critical":[6,166],"line":[7],"of":[8,30,52,104,120,133,141,153,161,172],"defense":[9],"in":[10,101],"contemporary":[11],"cybersecurity":[12],"efforts,":[13],"designed":[14,65],"to":[15,37,68,75,168],"identify":[16],"and":[17,21,42,83,97,143,164],"counteract":[18],"unauthorized":[19],"access":[20],"malicious":[22],"activities":[23],"within":[24],"computer":[25,173],"networks.":[26],"Leveraging":[27],"the":[28,49,102,170],"capabilities":[29],"Machine":[31,58],"Learning":[32],"(ML)":[33],"algorithms,":[34],"IDS":[35],"endeavors":[36],"distinguish":[38],"potentially":[39],"harmful":[40],"alterations":[41],"security":[43,72,171],"breaches.":[44],"This":[45,155],"study":[46],"delves":[47],"into":[48],"pivotal":[50],"question":[51],"algorithm":[53],"selection":[54],"for":[55],"optimal":[56],"performance.":[57],"Learning-based":[59],"(ML-IDS)":[63],"are":[64,110],"not":[66],"only":[67],"enhance":[69,169],"overall":[70],"system":[71],"but":[73],"also":[74],"strike":[76],"balance":[78],"between":[79],"minimizing":[80],"false":[81],"alarms":[82],"maximizing":[84],"true":[85],"alarm":[86],"rates.":[87],"To":[88],"address":[89],"this,":[90],"we":[91],"empirically":[92],"evaluate":[93],"five":[94],"ML":[95],"algorithms":[96,109,163],"present":[98],"their":[99],"performance":[100,126],"context":[103],"network":[105],"intrusion":[106],"detection.":[107],"Those":[108],"as":[111],"follows:":[112],"Random":[113],"Forest":[114],"achieves":[115],"an":[116,131,151],"impressive":[117],"accuracy":[118,132,140,152],"rate":[119],"99.88%,":[121],"Gradient":[122],"Boosting":[123],"demonstrates":[124],"robust":[125],"at":[127],"99.76%,":[128],"AdaBoost":[129],"exhibits":[130],"90.00%,":[134],"Decision":[135],"Tree":[136],"boasts":[137],"noteworthy":[139],"99.80%,":[142],"Extremely":[144],"Randomized":[145],"Trees":[146],"demonstrate":[147],"substantial":[148],"proficiency":[149],"with":[150],"99.86%.":[154],"empirical":[156],"exploration":[157],"enriches":[158],"our":[159],"comprehension":[160],"these":[162],"offers":[165],"insights":[167],"systems.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
