{"id":"https://openalex.org/W4416962074","doi":"https://doi.org/10.1109/icumt67815.2025.11268763","title":"A Multi-Head Attention and Residual Dense Network with Dynamic Sampling for Fine-Grained Network Intrusion Classification","display_name":"A Multi-Head Attention and Residual Dense Network with Dynamic Sampling for Fine-Grained Network Intrusion Classification","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4416962074","doi":"https://doi.org/10.1109/icumt67815.2025.11268763"},"language":null,"primary_location":{"id":"doi:10.1109/icumt67815.2025.11268763","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt67815.2025.11268763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014617118","display_name":"Neha Shukla","orcid":"https://orcid.org/0000-0002-1753-4987"},"institutions":[{"id":"https://openalex.org/I168870486","display_name":"St. John's College of Nursing","ror":"https://ror.org/03cqnhx95","country_code":"US","type":"education","lineage":["https://openalex.org/I168870486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Neha Shukla","raw_affiliation_strings":["St. John College of Engg.&#x0026; Mgmt.,Dept. of CSE (Data Science),Palghar,Maharashtra,India"],"affiliations":[{"raw_affiliation_string":"St. John College of Engg.&#x0026; Mgmt.,Dept. of CSE (Data Science),Palghar,Maharashtra,India","institution_ids":["https://openalex.org/I168870486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005485404","display_name":"Rakesh Chandra Joshi","orcid":"https://orcid.org/0000-0003-1264-9010"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]},{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE","IN"],"is_corresponding":false,"raw_author_name":"Rakesh Chandra Joshi","raw_affiliation_strings":["Amity University Uttar Pradesh,Amity Centre of Artificial Intelligence,Noida,India"],"affiliations":[{"raw_affiliation_string":"Amity University Uttar Pradesh,Amity Centre of Artificial Intelligence,Noida,India","institution_ids":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107233161","display_name":"Radim Burget","orcid":null},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Radim Burget","raw_affiliation_strings":["Brno University of Technology,FEEC,Dept. of Telecomunications,Brno,Czechia"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,FEEC,Dept. of Telecomunications,Brno,Czechia","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Martin Rosa","orcid":null},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Martin Rosa","raw_affiliation_strings":["Brno University of Technology,FEEC,Dept. of Telecomunications,Brno,Czechia"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,FEEC,Dept. of Telecomunications,Brno,Czechia","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038343229","display_name":"Malay Kishore Dutta","orcid":"https://orcid.org/0000-0003-2462-737X"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]},{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE","IN"],"is_corresponding":false,"raw_author_name":"Malay Kishore Dutta","raw_affiliation_strings":["Amity University Uttar Pradesh,Amity Centre of Artificial Intelligence,Noida,India"],"affiliations":[{"raw_affiliation_string":"Amity University Uttar Pradesh,Amity Centre of Artificial Intelligence,Noida,India","institution_ids":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014617118"],"corresponding_institution_ids":["https://openalex.org/I168870486"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41892155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"266","last_page":"271"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9057000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9057000279426575,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.01209999993443489,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.011099999770522118,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7657999992370605},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.6122000217437744},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5938000082969666},{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.5785999894142151},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5605999827384949},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.542900025844574},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.44269999861717224},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.4381999969482422},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.39719998836517334},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3481000065803528}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7735000252723694},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7657999992370605},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.6122000217437744},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5938000082969666},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.5785999894142151},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5605999827384949},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5572999715805054},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5432000160217285},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.542900025844574},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4587000012397766},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.44269999861717224},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.4381999969482422},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.39719998836517334},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.34689998626708984},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.34689998626708984},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.34220001101493835},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.3375000059604645},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.31630000472068787},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.31619998812675476},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C137524506","wikidata":"https://www.wikidata.org/wiki/Q2247688","display_name":"Anomaly-based intrusion detection system","level":3,"score":0.28529998660087585},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.2750000059604645},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.2614000141620636},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt67815.2025.11268763","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt67815.2025.11268763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2194775991","https://openalex.org/W2924689635","https://openalex.org/W3014732532","https://openalex.org/W3038955483","https://openalex.org/W3093410479","https://openalex.org/W3102359135","https://openalex.org/W4205413245","https://openalex.org/W4310398036","https://openalex.org/W4402298029","https://openalex.org/W4407943910","https://openalex.org/W4408724424"],"related_works":[],"abstract_inverted_index":{"Network":[0,26],"Intrusion":[1],"Detection":[2],"Systems":[3],"are":[4],"essential":[5],"for":[6,64,92,142,220],"monitoring":[7],"and":[8,14,20,49,118,146,160,198,209,217,230],"analyzing":[9],"network":[10],"traffic":[11],"to":[12,40,58,102,152],"detect":[13],"prevent":[15],"unauthorized":[16],"access,":[17],"malicious":[18],"activities,":[19],"security":[21],"breaches":[22],"in":[23,33,46,67,124,227],"real":[24],"time.":[25],"intrusion":[27,94,223],"detection":[28],"systems":[29],"face":[30],"persistent":[31],"challenges":[32],"accurately":[34],"identifying":[35],"finegrained":[36],"attack":[37,204],"subcategories":[38],"due":[39],"class":[41,130],"imbalance,":[42],"limited":[43],"feature":[44,106,111],"interactions":[45,112],"tabular":[47],"data,":[48],"variability":[50],"across":[51,166,180,202],"different":[52],"time":[53],"windows.":[54],"Models":[55],"often":[56],"struggle":[57],"capture":[59],"the":[60,100,163,194],"hidden":[61],"patterns":[62],"required":[63],"multi-class":[65,222],"classification":[66,179],"imbalanced":[68],"flow-based":[69],"datasets.":[70],"To":[71],"overcome":[72],"these":[73],"limitations,":[74],"this":[75],"work":[76],"proposes":[77],"a":[78,187,215],"deep":[79,125],"learning":[80,123],"framework":[81],"that":[82],"combines":[83],"Multi-Head":[84],"Self-Attention":[85],"(MHSA)":[86],"with":[87],"Residual":[88],"Dense":[89],"Blocks":[90],"(RDBs)":[91],"fine-grained":[93],"classification.":[95],"The":[96,114,156,183],"MHSA":[97],"layers":[98],"enable":[99],"model":[101,157],"learn":[103],"complex,":[104],"non-sequential":[105],"dependencies":[107],"by":[108],"attending":[109],"multiple":[110],"simultaneously.":[113],"RDBs":[115],"enhance":[116],"depth":[117],"gradient":[119],"stability,":[120],"facilitating":[121],"effective":[122],"networks,":[126],"especially":[127],"under":[128],"sparse":[129],"conditions.":[131],"A":[132],"dynamic":[133],"sampling":[134],"strategy":[135],"is":[136,158],"incorporated":[137],"during":[138],"training,":[139],"employing":[140],"SMOTE":[141],"oversampling":[143],"minority":[144],"classes":[145,151],"random":[147],"under-sampling":[148],"of":[149,190],"majority":[150],"ensure":[153],"balanced":[154],"learning.":[155],"trained":[159],"evaluated":[161],"on":[162,193],"large":[164],"dataset":[165],"four":[167],"temporal":[168],"resolutions":[169],"($5":[170],"\\mathrm{~s},":[171,173,175],"10":[172,195],"30":[174],"60":[176],"\\mathrm{~s}$),":[177],"targeting":[178],"13":[181],"subcategories.":[182],"proposed":[184],"architecture":[185],"achieves":[186],"peak":[188],"accuracy":[189],"$99.89":[191],"\\%$":[192],"-second":[196],"window":[197],"maintains":[199],"high":[200],"recall":[201],"rare":[203],"types":[205],"such":[206],"as":[207],"recon-dns":[208],"brute":[210],"force-ftp.":[211],"This":[212],"methodology":[213],"demonstrates":[214],"robust":[216],"scalable":[218],"solution":[219],"real-time,":[221],"detection,":[224],"offering":[225],"improvements":[226],"accuracy,":[228],"fairness,":[229],"adaptability":[231],"over":[232],"existing":[233],"baseline":[234],"models.":[235]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-12-03T00:00:00"}
