{"id":"https://openalex.org/W4414229217","doi":"https://doi.org/10.1109/lnet.2025.3610610","title":"Toward Robust IDS in Network Security: Handling Class Imbalance With Deep Hybrid Architectures","display_name":"Toward Robust IDS in Network Security: Handling Class Imbalance With Deep Hybrid Architectures","publication_year":2025,"publication_date":"2025-09-16","ids":{"openalex":"https://openalex.org/W4414229217","doi":"https://doi.org/10.1109/lnet.2025.3610610"},"language":"en","primary_location":{"id":"doi:10.1109/lnet.2025.3610610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lnet.2025.3610610","pdf_url":null,"source":{"id":"https://openalex.org/S4210234060","display_name":"IEEE Networking Letters","issn_l":"2576-3156","issn":["2576-3156"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Networking Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119630533","display_name":"Saransh Shanka","orcid":null},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Saransh Shankar","raw_affiliation_strings":["Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India"],"raw_orcid":"https://orcid.org/0009-0002-6114-6997","affiliations":[{"raw_affiliation_string":"Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Divjot Singh","orcid":"https://orcid.org/0009-0004-0210-7765"},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Divjot Singh","raw_affiliation_strings":["Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India"],"raw_orcid":"https://orcid.org/0009-0004-0210-7765","affiliations":[{"raw_affiliation_string":"Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051437418","display_name":"Anurag Badoni","orcid":null},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anurag Badoni","raw_affiliation_strings":["Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India"],"raw_orcid":"https://orcid.org/0009-0006-5169-8199","affiliations":[{"raw_affiliation_string":"Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020420437","display_name":"Mahendra K. Shukla","orcid":"https://orcid.org/0000-0002-7409-4236"},"institutions":[{"id":"https://openalex.org/I9747756","display_name":"Atal Bihari Vajpayee Indian Institute of Information Technology and Management","ror":"https://ror.org/008b3ap06","country_code":"IN","type":"education","lineage":["https://openalex.org/I9747756"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mahendra K. Shukla","raw_affiliation_strings":["Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India"],"raw_orcid":"https://orcid.org/0000-0002-7409-4236","affiliations":[{"raw_affiliation_string":"Department of Information Technology, ABV-IIITM Gwalior, Gwalior, India","institution_ids":["https://openalex.org/I9747756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067182182","display_name":"Om Jee Pandey","orcid":"https://orcid.org/0000-0002-2418-7135"},"institutions":[{"id":"https://openalex.org/I56404289","display_name":"Indian Institute of Technology BHU","ror":"https://ror.org/01kh5gc44","country_code":"IN","type":"education","lineage":["https://openalex.org/I56404289"]},{"id":"https://openalex.org/I91357014","display_name":"Banaras Hindu University","ror":"https://ror.org/04cdn2797","country_code":"IN","type":"education","lineage":["https://openalex.org/I91357014"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Om Jee Pandey","raw_affiliation_strings":["Department of Electronics Engineering, IIT BHU Varanasi, Varanasi, India","Department of Electronics Engineering, Iit Bhu Varanasi, Varanasi, India"],"raw_orcid":"https://orcid.org/0000-0002-2418-7135","affiliations":[{"raw_affiliation_string":"Department of Electronics Engineering, IIT BHU Varanasi, Varanasi, India","institution_ids":["https://openalex.org/I56404289","https://openalex.org/I91357014"]},{"raw_affiliation_string":"Department of Electronics Engineering, Iit Bhu Varanasi, Varanasi, India","institution_ids":["https://openalex.org/I56404289"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072015888","display_name":"Nadjib Aitsaadi","orcid":"https://orcid.org/0009-0007-8538-8380"},"institutions":[{"id":"https://openalex.org/I195731000","display_name":"Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines","ror":"https://ror.org/03mkjjy25","country_code":"FR","type":"education","lineage":["https://openalex.org/I195731000","https://openalex.org/I277688954"]},{"id":"https://openalex.org/I277688954","display_name":"Universit\u00e9 Paris-Saclay","ror":"https://ror.org/03xjwb503","country_code":"FR","type":"education","lineage":["https://openalex.org/I277688954"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Nadjib Aitsaadi","raw_affiliation_strings":["Paris-Saclay University, UVSQ, DAVID, Versailles, France"],"raw_orcid":"https://orcid.org/0009-0007-8538-8380","affiliations":[{"raw_affiliation_string":"Paris-Saclay University, UVSQ, DAVID, Versailles, France","institution_ids":["https://openalex.org/I195731000","https://openalex.org/I277688954"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5119630533"],"corresponding_institution_ids":["https://openalex.org/I9747756"],"apc_list":null,"apc_paid":null,"fwci":2.0398,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8987796,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"7","issue":"4","first_page":"357","last_page":"361"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9678000211715698,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hyperparameter","display_name":"Hyperparameter","score":0.5583999752998352},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5490999817848206},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5394999980926514},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.4779999852180481},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.42289999127388},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.3903000056743622},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.3874000012874603},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3808000087738037},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3630000054836273}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7213000059127808},{"id":"https://openalex.org/C8642999","wikidata":"https://www.wikidata.org/wiki/Q4171168","display_name":"Hyperparameter","level":2,"score":0.5583999752998352},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5490999817848206},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5432999730110168},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5394999980926514},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.4779999852180481},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47690001130104065},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4332999885082245},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.42289999127388},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3903000056743622},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.3874000012874603},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3808000087738037},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3630000054836273},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.3571000099182129},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.3305000066757202},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.3246000111103058},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3203999996185303},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.31369999051094055},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C2781395549","wikidata":"https://www.wikidata.org/wiki/Q4680762","display_name":"Adaptive sampling","level":3,"score":0.29980000853538513},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C117251300","wikidata":"https://www.wikidata.org/wiki/Q1849855","display_name":"Parametric statistics","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.27140000462532043},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.2705000042915344},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.26080000400543213},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lnet.2025.3610610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lnet.2025.3610610","pdf_url":null,"source":{"id":"https://openalex.org/S4210234060","display_name":"IEEE Networking Letters","issn_l":"2576-3156","issn":["2576-3156"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Networking Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2783741806","https://openalex.org/W2915969651","https://openalex.org/W2997591727","https://openalex.org/W3001364574","https://openalex.org/W3033120446","https://openalex.org/W3043530913","https://openalex.org/W3082065751","https://openalex.org/W3116274835","https://openalex.org/W4307561204","https://openalex.org/W4322753725","https://openalex.org/W4327750468","https://openalex.org/W4398764982","https://openalex.org/W4409795856"],"related_works":[],"abstract_inverted_index":{"The":[0,138],"growing":[1],"sophistication":[2],"of":[3,87,158],"cyberattacks":[4],"demands":[5],"Intrusion":[6],"Detection":[7],"Systems":[8],"(IDS)":[9],"that":[10],"are":[11,79],"both":[12,133],"accurate":[13],"and":[14,30,57,66,84,103,129,135,156],"adaptive":[15,95],"to":[16,27],"diverse":[17],"network":[18,35,93],"threats.":[19],"Traditional":[20],"IDS":[21,46],"often":[22],"suffer":[23],"degraded":[24],"performance":[25],"due":[26],"high-dimensional":[28],"features":[29],"severe":[31],"class":[32,74],"imbalance":[33],"in":[34,131],"traffic":[36],"datasets.":[37],"To":[38],"address":[39],"these":[40],"issues,":[41],"we":[42],"propose":[43],"a":[44,81,85,91],"hybrid":[45],"framework":[47,140],"integrating":[48],"four":[49],"optimized":[50],"models":[51],"(XGBoost,":[52],"Long":[53],"Short-Term":[54],"Memory,":[55],"MiniVGGNet,":[56],"AlexNet)":[58],"enhanced":[59],"through":[60],"Random":[61],"Forest":[62],"Regressor-based":[63],"feature":[64],"selection":[65],"the":[67,110,113,154],"Difficult":[68],"Set":[69],"Sampling":[70],"Technique":[71],"(DSSTE)":[72],"for":[73,94,144,167],"balancing.":[75],"Two":[76],"integration":[77],"strategies":[78],"employed:":[80],"hard-voting":[82],"Ensemble":[83],"Mixture":[86],"Experts":[88],"(MoE)":[89],"with":[90,120],"gating":[92],"weighting.":[96],"Comprehensive":[97],"hyperparameter":[98],"tuning":[99],"via":[100],"Keras":[101],"Tuner":[102],"RandomizedSearchCV":[104],"maximizes":[105],"model":[106],"performance.":[107],"Evaluated":[108],"on":[109],"CICIDS-2017":[111],"dataset,":[112],"system":[114],"achieves":[115],"detection":[116],"rates":[117],"above":[118],"99%":[119],"micro-average":[121],"AUC":[122],"values":[123],"near":[124],"1.0,":[125],"demonstrating":[126],"strong":[127,142],"generalization":[128],"effectiveness":[130],"detecting":[132],"majority":[134],"minority":[136],"intrusions.":[137],"proposed":[139],"holds":[141],"relevance":[143],"security-critical":[145],"domains,":[146],"particularly":[147],"wireless":[148],"health":[149],"monitoring":[150],"systems,":[151],"where":[152],"ensuring":[153],"confidentiality":[155],"integrity":[157],"sensitive":[159],"data":[160],"is":[161],"vital,":[162],"thereby":[163],"underscoring":[164],"its":[165],"suitability":[166],"real-world":[168],"deployment.":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
