{"id":"https://openalex.org/W7134917331","doi":"https://doi.org/10.1109/icnc68183.2026.11416826","title":"ReGAIN: Retrieval-Grounded AI Framework for Network Traffic Analysis","display_name":"ReGAIN: Retrieval-Grounded AI Framework for Network Traffic Analysis","publication_year":2026,"publication_date":"2026-02-16","ids":{"openalex":"https://openalex.org/W7134917331","doi":"https://doi.org/10.1109/icnc68183.2026.11416826"},"language":null,"primary_location":{"id":"doi:10.1109/icnc68183.2026.11416826","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc68183.2026.11416826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2512.22223","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107821273","display_name":"Shaghayegh Shajarian","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shaghayegh Shajarian","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111348534","display_name":"K. Marsh","orcid":"https://orcid.org/0000-0003-4796-2971"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kennedy Marsh","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028514332","display_name":"James Benson","orcid":"https://orcid.org/0000-0001-7209-2344"},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]},{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Benson","raw_affiliation_strings":["Institute for Cyber Security University of Texas at San Antonio,San Antonio,TX,USA"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security University of Texas at San Antonio,San Antonio,TX,USA","institution_ids":["https://openalex.org/I45438204","https://openalex.org/I1335518801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082756758","display_name":"Sajad Khorsandroo","orcid":"https://orcid.org/0000-0003-0649-9247"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajad Khorsandroo","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128788713","display_name":"Mahmoud Abdelsalam","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahmoud Abdelsalam","raw_affiliation_strings":["North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina A&#x0026;T State University,Computer Science,Greensboro,NC,USA","institution_ids":["https://openalex.org/I35777872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5107821273"],"corresponding_institution_ids":["https://openalex.org/I35777872"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.64480104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"578","last_page":"584"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.2328999936580658,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.2328999936580658,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11344","display_name":"Traffic Prediction and Management Techniques","score":0.06539999693632126,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.05609999969601631,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.2856000065803528},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.2734000086784363},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.2712000012397766},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.2500999867916107}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.604200005531311},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3278000056743622},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2994000017642975},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.2856000065803528},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2687999904155731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2538999915122986},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.2500999867916107},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.24959999322891235}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icnc68183.2026.11416826","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc68183.2026.11416826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2026 International Conference on Computing, Networking and Communications (ICNC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2512.22223","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.22223","pdf_url":"https://arxiv.org/pdf/2512.22223","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2512.22223","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.22223","pdf_url":"https://arxiv.org/pdf/2512.22223","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1341791957","display_name":null,"funder_award_id":"2230610","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4767151281","display_name":null,"funder_award_id":"2113945","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5409530191","display_name":null,"funder_award_id":"2200538","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5472796524","display_name":null,"funder_award_id":"2416992","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7134917331.pdf","grobid_xml":"https://content.openalex.org/works/W7134917331.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W2040333627","https://openalex.org/W4391590983","https://openalex.org/W4400236709","https://openalex.org/W4404622131","https://openalex.org/W4408749848","https://openalex.org/W4409261757","https://openalex.org/W4409796734","https://openalex.org/W4416470949"],"related_works":[],"abstract_inverted_index":{"Modern":[0],"networks":[1],"generate":[2],"vast,":[3],"heterogeneous":[4],"traffic":[5,17,48,64,129],"that":[6,46],"must":[7],"be":[8],"continuously":[9],"analyzed":[10],"for":[11,59],"security":[12],"and":[13,31,53,61,80,105,112,121,139,145,159,169],"performance.":[14],"Traditional":[15],"network":[16,63,71],"analysis":[18],"systems,":[19],"whether":[20],"rule-based":[21],"or":[22],"machine":[23],"learning-driven,":[24],"often":[25],"suffer":[26],"from":[27,70,126],"high":[28],"false":[29],"positives":[30],"lack":[32],"interpretability,":[33],"limiting":[34],"analyst":[35],"trust.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40],"present":[41],"ReGAIN,":[42],"a":[43,76,82,100],"multi-stage":[44],"framework":[45],"combines":[47],"summarization,":[49],"retrieval-augmented":[50],"generation":[51],"(RAG),":[52],"Large":[54],"Language":[55],"Model":[56],"(LLM)":[57],"reasoning":[58],"transparent":[60],"accurate":[62],"analysis.":[65],"ReGAIN":[66,163],"creates":[67],"natural-language":[68],"summaries":[69],"traffic,":[72],"embeds":[73],"them":[74],"into":[75],"multi-collection":[77],"vector":[78],"database,":[79],"utilizes":[81],"hierarchical":[83],"retrieval":[84],"pipeline":[85,94],"to":[86,109],"ground":[87,157],"LLM":[88],"responses":[89],"with":[90],"evidence":[91],"citations.":[92],"The":[93],"features":[95],"metadata-based":[96],"filtering,":[97],"MMR":[98],"sampling,":[99],"two-stage":[101],"cross-encoder":[102],"reranking":[103],"mechanism,":[104],"an":[106],"abstention":[107],"mechanism":[108],"reduce":[110],"hallucinations":[111],"ensure":[113],"grounded":[114],"reasoning.":[115],"Evaluated":[116],"on":[117],"ICMP":[118],"ping":[119],"flood":[120,124],"TCP":[122],"SYN":[123],"traces":[125],"the":[127],"real-world":[128],"dataset,":[130],"it":[131],"demonstrates":[132],"robust":[133],"performance,":[134],"achieving":[135],"accuracy":[136],"between":[137],"95.95%":[138],"98.82%":[140],"across":[141],"different":[142],"attack":[143],"types":[144],"evaluation":[146],"benchmarks.":[147],"These":[148],"results":[149],"are":[150],"validated":[151],"against":[152],"two":[153],"complementary":[154],"sources:":[155],"dataset":[156],"truth":[158],"human":[160],"expert":[161],"assessments.":[162],"also":[164],"outperforms":[165],"rule-based,":[166],"classical":[167],"ML,":[168],"deep":[170],"learning":[171],"baselines":[172],"while":[173],"providing":[174],"unique":[175],"explainability":[176],"through":[177],"trustworthy,":[178],"verifiable":[179],"responses.":[180]},"counts_by_year":[],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2026-03-12T00:00:00"}
