{"id":"https://openalex.org/W4411447298","doi":"https://doi.org/10.1109/hpsr64165.2025.11038896","title":"AI-Powered Intrusion Detection for Secure and Efficient SDN in Network Virtualization","display_name":"AI-Powered Intrusion Detection for Secure and Efficient SDN in Network Virtualization","publication_year":2025,"publication_date":"2025-05-20","ids":{"openalex":"https://openalex.org/W4411447298","doi":"https://doi.org/10.1109/hpsr64165.2025.11038896"},"language":"en","primary_location":{"id":"doi:10.1109/hpsr64165.2025.11038896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpsr64165.2025.11038896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 26th International Conference on High Performance Switching and Routing (HPSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.ulster.ac.uk/en/publications/79ee5edc-0219-4f51-9856-4f3aded3c532","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042846465","display_name":"Akshat Gaurav","orcid":"https://orcid.org/0000-0002-5796-9424"},"institutions":[{"id":"https://openalex.org/I4210147267","display_name":"Ronin Institute","ror":"https://ror.org/04awze035","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147267"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Akshat Gaurav","raw_affiliation_strings":["Ronin Institute,NJ,USA"],"affiliations":[{"raw_affiliation_string":"Ronin Institute,NJ,USA","institution_ids":["https://openalex.org/I4210147267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071261948","display_name":"Brij B. Gupta","orcid":"https://orcid.org/0000-0003-4929-4698"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Brij B. Gupta","raw_affiliation_strings":["Asia University,Department of Computer Science and Information Engineering,Taichung,Taiwan,413"],"affiliations":[{"raw_affiliation_string":"Asia University,Department of Computer Science and Information Engineering,Taichung,Taiwan,413","institution_ids":["https://openalex.org/I143578492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041954077","display_name":"Priyanka Chaurasia","orcid":"https://orcid.org/0000-0003-4249-3678"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Priyanka Chaurasia","raw_affiliation_strings":["University of Ulster,UK"],"affiliations":[{"raw_affiliation_string":"University of Ulster,UK","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086803967","display_name":"Varsha Arya","orcid":"https://orcid.org/0000-0001-7549-4429"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Varsha Arya","raw_affiliation_strings":["Hong Kong Metropolitan University,Hong Kong SAR,China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Metropolitan University,Hong Kong SAR,China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010362877","display_name":"Razaz Waheeb Attar","orcid":"https://orcid.org/0000-0001-9819-7945"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]},{"id":"https://openalex.org/I4210165529","display_name":"University of Business and Technology","ror":"https://ror.org/05tcr1n44","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210165529"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Razaz Waheeb Attar","raw_affiliation_strings":["Princess Nourah Bint Abdulrahman University,Management Department College of Business Administration,Riyadh,Saudi Arabia,11671"],"affiliations":[{"raw_affiliation_string":"Princess Nourah Bint Abdulrahman University,Management Department College of Business Administration,Riyadh,Saudi Arabia,11671","institution_ids":["https://openalex.org/I106778892","https://openalex.org/I4210165529"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086102702","display_name":"Kwok Tai Chui","orcid":"https://orcid.org/0000-0001-7992-9901"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kwok Tai Chui","raw_affiliation_strings":["Hong Kong Metropolitan University,Hong Kong SAR,China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Metropolitan University,Hong Kong SAR,China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042846465"],"corresponding_institution_ids":["https://openalex.org/I4210147267"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1818227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.7767423987388611},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7474972009658813},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7190789580345154},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6149449348449707},{"id":"https://openalex.org/keywords/network-virtualization","display_name":"Network virtualization","score":0.5543241500854492},{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.5120378136634827},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.5050590634346008},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43608468770980835},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2650432884693146},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.1282854974269867}],"concepts":[{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.7767423987388611},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7474972009658813},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7190789580345154},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6149449348449707},{"id":"https://openalex.org/C2779898492","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Network virtualization","level":4,"score":0.5543241500854492},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.5120378136634827},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.5050590634346008},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43608468770980835},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2650432884693146},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.1282854974269867}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/hpsr64165.2025.11038896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpsr64165.2025.11038896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 26th International Conference on High Performance Switching and Routing (HPSR)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/79ee5edc-0219-4f51-9856-4f3aded3c532","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/79ee5edc-0219-4f51-9856-4f3aded3c532","pdf_url":null,"source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gaurav, A, Gupta, B B, Chaurasia, P, Arya, V, Attar, R W & Chui, K T 2025, AI-Powered Intrusion Detection for Secure and Efficient SDN in Network Virtualization. in 2025 IEEE 26th International Conference on High Performance Switching and Routing, HPSR 2025. IEEE International Conference on High Performance Switching and Routing, HPSR, IEEE, pp. 1-6, 2025 IEEE 26th International Conference on High Performance Switching and Routing (HPSR), Suita, Osaka, Japan, 20/05/25. https://doi.org/10.1109/hpsr64165.2025.11038896","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/79ee5edc-0219-4f51-9856-4f3aded3c532","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/79ee5edc-0219-4f51-9856-4f3aded3c532","pdf_url":null,"source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Gaurav, A, Gupta, B B, Chaurasia, P, Arya, V, Attar, R W & Chui, K T 2025, AI-Powered Intrusion Detection for Secure and Efficient SDN in Network Virtualization. in 2025 IEEE 26th International Conference on High Performance Switching and Routing, HPSR 2025. IEEE International Conference on High Performance Switching and Routing, HPSR, IEEE, pp. 1-6, 2025 IEEE 26th International Conference on High Performance Switching and Routing (HPSR), Suita, Osaka, Japan, 20/05/25. https://doi.org/10.1109/hpsr64165.2025.11038896","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320331164","display_name":"National Science and Technology Council","ror":"https://ror.org/00wnb9798"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2965181964","https://openalex.org/W3161868942","https://openalex.org/W3198283894","https://openalex.org/W4372342980","https://openalex.org/W4389236048","https://openalex.org/W4390655730","https://openalex.org/W4404302957","https://openalex.org/W4404643988","https://openalex.org/W4404767278","https://openalex.org/W4405263460","https://openalex.org/W4405993700","https://openalex.org/W4406559927","https://openalex.org/W4406927588","https://openalex.org/W4407602578","https://openalex.org/W4408434153","https://openalex.org/W4408708725","https://openalex.org/W6965218130"],"related_works":["https://openalex.org/W2317094215","https://openalex.org/W2947277503","https://openalex.org/W112648010","https://openalex.org/W2038957884","https://openalex.org/W206565998","https://openalex.org/W2122873612","https://openalex.org/W2392603527","https://openalex.org/W2111213071","https://openalex.org/W2390009783","https://openalex.org/W2461440407"],"abstract_inverted_index":{"Ensuring":[0],"secure":[1],"and":[2,34,57,82],"efficient":[3],"intrusion":[4,76],"detection":[5],"in":[6],"Software-Defined":[7],"Networking":[8],"(SDN)":[9],"within":[10],"network":[11,80],"virtualization":[12],"is":[13,42],"crucial":[14],"for":[15,38,84],"modern":[16],"cybersecurity.":[17],"In":[18],"this":[19,21,71],"context,":[20],"work":[22],"presents":[23,73],"an":[24,74],"AI-powered":[25],"hybrid":[26],"deep":[27],"learning":[28],"model":[29],"integrating":[30],"CNN,":[31],"LSTM,":[32],"GRU,":[33],"a":[35],"Transformer":[36],"Encoder":[37],"feature":[39],"selection.":[40],"SMOTE":[41],"used":[43],"to":[44,63],"balance":[45],"class":[46],"distributions,":[47],"therefore":[48,61],"strengthening":[49],"the":[50],"model.":[51],"With":[52],"ROC-AUC":[53],"values":[54],"of":[55,59],"0.9628,":[56],"accuracy":[58],"82%,":[60],"attesting":[62],"improved":[64],"classification":[65],"performance.":[66],"For":[67],"virtualized":[68],"SDN":[69],"settings,":[70],"method":[72],"adaptive":[75],"detection,":[77],"hence":[78],"improving":[79],"security":[81],"dependability":[83],"useful":[85],"cyber-defense":[86],"purposes.":[87]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
