{"id":"https://openalex.org/W4312384107","doi":"https://doi.org/10.1109/jiot.2022.3211346","title":"An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks","display_name":"An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks","publication_year":2022,"publication_date":"2022-10-03","ids":{"openalex":"https://openalex.org/W4312384107","doi":"https://doi.org/10.1109/jiot.2022.3211346"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3211346","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3211346","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jiot.2022.3211346","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021047372","display_name":"Cheol-Hee Park","orcid":"https://orcid.org/0000-0002-3637-9951"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Cheolhee Park","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036908879","display_name":"Jonghoon Lee","orcid":"https://orcid.org/0000-0002-0071-0948"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jonghoon Lee","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100395864","display_name":"Youngsoo Kim","orcid":"https://orcid.org/0000-0002-1494-9503"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngsoo Kim","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020148516","display_name":"Jong\u2010Geun Park","orcid":"https://orcid.org/0000-0003-4973-7700"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong-Geun Park","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100359562","display_name":"Hyunjin Kim","orcid":"https://orcid.org/0000-0002-8390-9505"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyunjin Kim","raw_affiliation_strings":["Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024081692","display_name":"Dowon Hong","orcid":"https://orcid.org/0000-0001-9690-5055"},"institutions":[{"id":"https://openalex.org/I206597221","display_name":"Kongju National University","ror":"https://ror.org/0373nm262","country_code":"KR","type":"education","lineage":["https://openalex.org/I206597221"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Dowon Hong","raw_affiliation_strings":["Department of Applied Mathematics, Kongju National University, Gongju, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics, Kongju National University, Gongju, South Korea","institution_ids":["https://openalex.org/I206597221"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021047372"],"corresponding_institution_ids":["https://openalex.org/I142401562"],"apc_list":null,"apc_paid":null,"fwci":33.5292,"has_fulltext":false,"cited_by_count":260,"citation_normalized_percentile":{"value":0.99920367,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"10","issue":"3","first_page":"2330","last_page":"2345"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8493392467498779},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.7256966233253479},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6335027813911438},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.629889726638794},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5553372502326965},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.555302619934082},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5334226489067078},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5039371848106384},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.5001833438873291},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.49299928545951843},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4919900596141815},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4517946243286133},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4448450207710266},{"id":"https://openalex.org/keywords/attack-surface","display_name":"Attack surface","score":0.42617887258529663},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41815850138664246},{"id":"https://openalex.org/keywords/generative-adversarial-network","display_name":"Generative adversarial network","score":0.4159677028656006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1817002296447754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8493392467498779},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.7256966233253479},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6335027813911438},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.629889726638794},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5553372502326965},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.555302619934082},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5334226489067078},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5039371848106384},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.5001833438873291},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.49299928545951843},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4919900596141815},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4517946243286133},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4448450207710266},{"id":"https://openalex.org/C2776576444","wikidata":"https://www.wikidata.org/wiki/Q303569","display_name":"Attack surface","level":2,"score":0.42617887258529663},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41815850138664246},{"id":"https://openalex.org/C2988773926","wikidata":"https://www.wikidata.org/wiki/Q25104379","display_name":"Generative adversarial network","level":3,"score":0.4159677028656006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1817002296447754},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3211346","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3211346","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jiot.2022.3211346","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3211346","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2716349371","display_name":null,"funder_award_id":"2020-0\u201300952","funder_id":"https://openalex.org/F4320322030","funder_display_name":"Ministry of Science, ICT and Future Planning"}],"funders":[{"id":"https://openalex.org/F4320322030","display_name":"Ministry of Science, ICT and Future Planning","ror":"https://ror.org/032e49973"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1563088657","https://openalex.org/W1995443851","https://openalex.org/W1995678176","https://openalex.org/W2099940443","https://openalex.org/W2125055259","https://openalex.org/W2125389028","https://openalex.org/W2296509296","https://openalex.org/W2335999708","https://openalex.org/W2399941526","https://openalex.org/W2560162835","https://openalex.org/W2584408238","https://openalex.org/W2616332741","https://openalex.org/W2762776925","https://openalex.org/W2766736793","https://openalex.org/W2767092890","https://openalex.org/W2783741806","https://openalex.org/W2809471091","https://openalex.org/W2883554196","https://openalex.org/W2889165715","https://openalex.org/W2891273344","https://openalex.org/W2892336822","https://openalex.org/W2963684088","https://openalex.org/W2984048605","https://openalex.org/W2984419450","https://openalex.org/W2987485128","https://openalex.org/W3042945059","https://openalex.org/W3043459281","https://openalex.org/W3086737406","https://openalex.org/W3087836803","https://openalex.org/W3088420918","https://openalex.org/W3107578692","https://openalex.org/W3125993293","https://openalex.org/W3155962425","https://openalex.org/W3163895120","https://openalex.org/W4206450891","https://openalex.org/W4226248369","https://openalex.org/W4295274059","https://openalex.org/W6675401909","https://openalex.org/W6678815747","https://openalex.org/W6685352114","https://openalex.org/W6736155344","https://openalex.org/W6741832134","https://openalex.org/W6754355446"],"related_works":["https://openalex.org/W3155797402","https://openalex.org/W4390187619","https://openalex.org/W2591273803","https://openalex.org/W3081645608","https://openalex.org/W4312119938","https://openalex.org/W4389076566","https://openalex.org/W2995862995","https://openalex.org/W4390018122","https://openalex.org/W3158967187","https://openalex.org/W3155916161"],"abstract_inverted_index":{"As":[0],"communication":[1,22],"technology":[2],"advances,":[3],"various":[4,55,70,184],"and":[5,29,69,99,124,161,167,187],"heterogeneous":[6],"data":[7,88,121,148,185],"are":[8],"communicated":[9],"in":[10,90],"distributed":[11],"environments":[12],"through":[13],"network":[14,32,44,104],"systems.":[15,131],"Meanwhile,":[16],"along":[17],"with":[18,39],"the":[19,24,54,77,85,120,126,129,134,158,174,190,195],"development":[20],"of":[21,79,87,128,176],"technology,":[23],"attack":[25,151],"surface":[26],"has":[27,49],"expanded,":[28],"concerns":[30],"regarding":[31],"security":[33],"have":[34,72],"increased.":[35],"Accordingly,":[36],"to":[37,75,102],"deal":[38],"potential":[40],"threats,":[41],"research":[42],"on":[43,62,157],"intrusion":[45],"detection":[46,67],"systems":[47,192],"(NIDSs)":[48],"been":[50,73],"actively":[51],"conducted.":[52],"Among":[53],"NIDS":[56,115],"technologies,":[57],"recent":[58],"interest":[59],"is":[60],"focused":[61,156],"artificial":[63],"intelligence":[64],"(AI)-based":[65],"anomaly":[66],"systems,":[68],"models":[71,93],"proposed":[74,191],"improve":[76,125],"performance":[78,127],"NIDS.":[80,198],"However,":[81],"there":[82],"still":[83],"exists":[84],"problem":[86,123],"imbalance,":[89],"which":[91],"AI":[92],"cannot":[94],"sufficiently":[95],"learn":[96],"malicious":[97],"behavior":[98],"thus":[100],"fail":[101],"detect":[103],"threats":[105],"accurately.":[106],"In":[107,153],"this":[108],"study,":[109],"we":[110,137,155,179],"propose":[111],"a":[112,139],"novel":[113],"AI-based":[114,197],"that":[116,143,189],"can":[117],"efficiently":[118],"resolve":[119],"imbalance":[122],"previous":[130,196],"To":[132,172],"address":[133],"aforementioned":[135],"problem,":[136],"leveraged":[138],"state-of-the-art":[140],"generative":[141,164],"model":[142],"could":[144],"generate":[145],"plausible":[146],"synthetic":[147],"for":[149],"minor":[150],"traffic.":[152],"particular,":[154],"reconstruction":[159],"error":[160],"Wasserstein":[162],"distance-based":[163],"adversarial":[165],"networks,":[166],"autoencoder-driven":[168],"deep":[169],"learning":[170],"models.":[171],"demonstrate":[173],"effectiveness":[175],"our":[177],"system,":[178],"performed":[180],"comprehensive":[181],"evaluations":[182],"over":[183],"sets":[186],"demonstrated":[188],"significantly":[193],"outperformed":[194]},"counts_by_year":[{"year":2026,"cited_by_count":25},{"year":2025,"cited_by_count":118},{"year":2024,"cited_by_count":86},{"year":2023,"cited_by_count":31}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
