{"id":"https://openalex.org/W4402673690","doi":"https://doi.org/10.1109/e-science62913.2024.10678662","title":"Enhancing Autonomous Intrusion Detection System with Generative Adversarial Networks","display_name":"Enhancing Autonomous Intrusion Detection System with Generative Adversarial Networks","publication_year":2024,"publication_date":"2024-09-16","ids":{"openalex":"https://openalex.org/W4402673690","doi":"https://doi.org/10.1109/e-science62913.2024.10678662"},"language":"en","primary_location":{"id":"doi:10.1109/e-science62913.2024.10678662","is_oa":false,"landing_page_url":"https://doi.org/10.1109/e-science62913.2024.10678662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on e-Science (e-Science)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106463564","display_name":"Kevin Kostage","orcid":"https://orcid.org/0009-0007-1773-7163"},"institutions":[{"id":"https://openalex.org/I2801014300","display_name":"Florida Gulf Coast University","ror":"https://ror.org/05tc5bm31","country_code":"US","type":"education","lineage":["https://openalex.org/I2801014300"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kevin Kostage","raw_affiliation_strings":["Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA"],"affiliations":[{"raw_affiliation_string":"Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA","institution_ids":["https://openalex.org/I2801014300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110788717","display_name":"David West","orcid":null},"institutions":[{"id":"https://openalex.org/I2801014300","display_name":"Florida Gulf Coast University","ror":"https://ror.org/05tc5bm31","country_code":"US","type":"education","lineage":["https://openalex.org/I2801014300"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David West","raw_affiliation_strings":["Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA"],"affiliations":[{"raw_affiliation_string":"Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA","institution_ids":["https://openalex.org/I2801014300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107607304","display_name":"Tim Meinert","orcid":null},"institutions":[{"id":"https://openalex.org/I2801014300","display_name":"Florida Gulf Coast University","ror":"https://ror.org/05tc5bm31","country_code":"US","type":"education","lineage":["https://openalex.org/I2801014300"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tim Meinert","raw_affiliation_strings":["Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA"],"affiliations":[{"raw_affiliation_string":"Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA","institution_ids":["https://openalex.org/I2801014300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023662385","display_name":"Chengyi Qu","orcid":"https://orcid.org/0000-0002-7936-4813"},"institutions":[{"id":"https://openalex.org/I2801014300","display_name":"Florida Gulf Coast University","ror":"https://ror.org/05tc5bm31","country_code":"US","type":"education","lineage":["https://openalex.org/I2801014300"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chengyi Qu","raw_affiliation_strings":["Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA"],"affiliations":[{"raw_affiliation_string":"Florida Gulf Coast University,Department of Computing and Software Engineering,Florida,USA","institution_ids":["https://openalex.org/I2801014300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072008189","display_name":"Prasad Calyam","orcid":"https://orcid.org/0000-0002-7666-5389"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prasad Calyam","raw_affiliation_strings":["University of Missouri,Department of Electrical Engineering and Computer Science,Columbia,USA"],"affiliations":[{"raw_affiliation_string":"University of Missouri,Department of Electrical Engineering and Computer Science,Columbia,USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004646137","display_name":"Luca Mazzola","orcid":"https://orcid.org/0000-0002-6747-1021"},"institutions":[{"id":"https://openalex.org/I81007117","display_name":"Lucerne University of Applied Sciences and Arts","ror":"https://ror.org/04nd0xd48","country_code":"CH","type":"education","lineage":["https://openalex.org/I81007117"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Luca Mazzola","raw_affiliation_strings":["Lucerne University of Applied Sciences and Arts,Lucerne,Switzerland"],"affiliations":[{"raw_affiliation_string":"Lucerne University of Applied Sciences and Arts,Lucerne,Switzerland","institution_ids":["https://openalex.org/I81007117"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5106463564"],"corresponding_institution_ids":["https://openalex.org/I2801014300"],"apc_list":null,"apc_paid":null,"fwci":1.502,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.8380179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9668999910354614,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9192000031471252,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8745917081832886},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7872118949890137},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7033833265304565},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.564705491065979},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.5025701522827148},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.4668498635292053},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.398867130279541},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3789832592010498},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.14899379014968872}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8745917081832886},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7872118949890137},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7033833265304565},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.564705491065979},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.5025701522827148},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.4668498635292053},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.398867130279541},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3789832592010498},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.14899379014968872}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/e-science62913.2024.10678662","is_oa":false,"landing_page_url":"https://doi.org/10.1109/e-science62913.2024.10678662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on e-Science (e-Science)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2134295053","https://openalex.org/W2612634114","https://openalex.org/W3002198744","https://openalex.org/W3087836803","https://openalex.org/W3160609953","https://openalex.org/W4285310467","https://openalex.org/W4353004226","https://openalex.org/W4382281941","https://openalex.org/W4385688300","https://openalex.org/W4396707597","https://openalex.org/W4400585973","https://openalex.org/W4401542153","https://openalex.org/W6735913928","https://openalex.org/W6756728290","https://openalex.org/W6765451912","https://openalex.org/W6781905506","https://openalex.org/W6786195202"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2888032422","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W1513478798","https://openalex.org/W2388497169","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W3120393658"],"abstract_inverted_index":{"Effective":[0],"training":[1],"in":[2,20,110,160],"Machine":[3],"Learning":[4,7],"and":[5,15,63,102,121,139,158,163],"Deep":[6],"models":[8,80],"necessitates":[9],"datasets":[10,84],"that":[11,69],"provide":[12],"sufficient":[13],"patterns":[14],"contextual":[16],"information,":[17],"particularly":[18],"crucial":[19],"IoT":[21],"networks.":[22],"Imbalanced":[23],"datasets,":[24,90],"however,":[25],"significantly":[26],"challenge":[27],"the":[28,76,114,128,146],"performance":[29,77,112],"of":[30,78,116,130,148],"Autonomous":[31],"Intrusion":[32],"Detection":[33],"Systems":[34],"(IDS),":[35],"leading":[36],"to":[37,65],"suboptimal":[38],"detection":[39],"rates":[40],"for":[41,154],"minority":[42],"classes.":[43],"In":[44],"this":[45,49],"paper,":[46],"we":[47,126],"address":[48],"issue":[50],"by":[51],"utilizing":[52],"various":[53],"Generative":[54],"Adversarial":[55],"Network":[56],"(GAN)":[57],"models,":[58],"including":[59],"WGANGP,":[60],"CGAN,":[61],"CTGAN,":[62],"CWGANGP,":[64],"generate":[66],"synthetic":[67],"data":[68],"balance":[70],"these":[71],"imbalanced":[72,165],"datasets.":[73,166],"We":[74],"evaluate":[75],"IDS":[79,111,156],"trained":[81,87],"on":[82,88],"GAN-augmented":[83],"against":[85],"those":[86],"unbalanced":[89],"considering":[91],"metrics":[92],"such":[93,136],"as":[94,137,150],"fitting":[95],"duration,":[96,98],"generation":[97],"accuracy,":[99],"precision,":[100],"recall,":[101],"F1":[103],"score.":[104],"Our":[105],"findings":[106],"reveal":[107],"substantial":[108],"improvements":[109],"with":[113,132],"application":[115],"GANs":[117,131,149],"across":[118],"binary,":[119],"general,":[120],"specific":[122],"attack":[123],"classifications.":[124],"Additionally,":[125],"compare":[127],"effectiveness":[129],"classical":[133],"sampling":[134],"algorithms,":[135],"SMOTE":[138],"Random":[140],"Oversampling.":[141],"This":[142],"comprehensive":[143],"evaluation":[144],"underscores":[145],"potential":[147],"a":[151],"sophisticated":[152],"solution":[153],"improving":[155],"accuracy":[157],"reliability":[159],"handling":[161],"complex":[162],"highly":[164]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
