{"id":"https://openalex.org/W4411472258","doi":"https://doi.org/10.1109/tnse.2025.3581689","title":"GCB-PPO2: A Hybrid Deep Reinforcement Learning Intrusion Detection System for Under-Represented Attack Categories in SDN","display_name":"GCB-PPO2: A Hybrid Deep Reinforcement Learning Intrusion Detection System for Under-Represented Attack Categories in SDN","publication_year":2025,"publication_date":"2025-06-20","ids":{"openalex":"https://openalex.org/W4411472258","doi":"https://doi.org/10.1109/tnse.2025.3581689"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3581689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3581689","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100686861","display_name":"Jue Chen","orcid":"https://orcid.org/0000-0001-7508-2635"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Jue","raw_affiliation_strings":["Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118397474","display_name":"Tao Hongyu","orcid":null},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Hongyu","raw_affiliation_strings":["Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076073231","display_name":"Meng Cui","orcid":"https://orcid.org/0000-0002-6337-9711"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cui Meng","raw_affiliation_strings":["Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118512403","display_name":"Peng Haidong","orcid":null},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Haidong","raw_affiliation_strings":["Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007950680","display_name":"Xihe Qiu","orcid":"https://orcid.org/0000-0003-4024-925X"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiu Xihe","raw_affiliation_strings":["Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai University of Engineering Science, School of Electronic and Electrical Engineering, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100686861"],"corresponding_institution_ids":["https://openalex.org/I141962983"],"apc_list":null,"apc_paid":null,"fwci":2.8392,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.91364176,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"84","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.748691201210022},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7278188467025757},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6319323778152466},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.511074423789978},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4343832731246948},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36397820711135864}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.748691201210022},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7278188467025757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6319323778152466},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.511074423789978},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4343832731246948},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36397820711135864}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2025.3581689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3581689","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G4862170252","display_name":null,"funder_award_id":"62102241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W2063542206","https://openalex.org/W2141739362","https://openalex.org/W2527999453","https://openalex.org/W2557450880","https://openalex.org/W2762776925","https://openalex.org/W2767106145","https://openalex.org/W2798967590","https://openalex.org/W2807319534","https://openalex.org/W2963017889","https://openalex.org/W2981025625","https://openalex.org/W3036012999","https://openalex.org/W3037958117","https://openalex.org/W3084346886","https://openalex.org/W3092448674","https://openalex.org/W3106709164","https://openalex.org/W3121026104","https://openalex.org/W3138381676","https://openalex.org/W3161554626","https://openalex.org/W3168530352","https://openalex.org/W3181610599","https://openalex.org/W3189227796","https://openalex.org/W3207675811","https://openalex.org/W4206657397","https://openalex.org/W4210671904","https://openalex.org/W4220886040","https://openalex.org/W4226076258","https://openalex.org/W4229022718","https://openalex.org/W4281295043","https://openalex.org/W4281686974","https://openalex.org/W4285233421","https://openalex.org/W4285392836","https://openalex.org/W4290717392","https://openalex.org/W4293902547","https://openalex.org/W4313479464","https://openalex.org/W4321201265","https://openalex.org/W4321792508","https://openalex.org/W4322761626","https://openalex.org/W4353057854","https://openalex.org/W4381799316","https://openalex.org/W4382654719","https://openalex.org/W4385338452","https://openalex.org/W4385638541","https://openalex.org/W4386575211","https://openalex.org/W4386898892","https://openalex.org/W4387011098","https://openalex.org/W4387046648","https://openalex.org/W4388599035","https://openalex.org/W4391896150","https://openalex.org/W4392364798","https://openalex.org/W4392867149","https://openalex.org/W4393185196","https://openalex.org/W4395467455","https://openalex.org/W4396581598","https://openalex.org/W4396779280","https://openalex.org/W4396817219","https://openalex.org/W4398150962","https://openalex.org/W4399114261","https://openalex.org/W4399802727","https://openalex.org/W4400647899","https://openalex.org/W4401010346","https://openalex.org/W4402156807","https://openalex.org/W4403789485","https://openalex.org/W4405024565","https://openalex.org/W4405812064","https://openalex.org/W4407900366","https://openalex.org/W4408323236"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W3086377361"],"abstract_inverted_index":{"The":[0,23],"centralized":[1],"control":[2],"plane":[3],"inherent":[4],"in":[5,221,252,288],"SDN":[6,135],"architecture":[7,126],"creates":[8],"critical":[9],"security":[10],"dependencies,":[11],"where":[12],"malicious":[13],"exploitation":[14],"of":[15,67,142,233],"controller":[16],"vulnerabilities":[17],"could":[18],"propagate":[19],"systemic":[20],"network":[21,174],"failures.":[22],"Intrusion":[24],"Detection":[25],"System":[26],"(IDS)":[27],"effectively":[28],"counters":[29],"cyber":[30],"threats,":[31],"and":[32,54,72,97,159,218,235,239],"Deep":[33],"Reinforcement":[34],"Learning":[35],"(DRL)":[36],"can":[37],"enable":[38],"the":[39,45,59,65,134,139,143,256],"IDS":[40,63],"to":[41,44,127,175,187],"dynamically":[42],"adapt":[43],"constantly":[46],"evolving":[47],"attack":[48,131,250],"patterns":[49],"through":[50],"autonomous":[51],"environmental":[52,189],"interaction":[53],"real-time":[55],"policy":[56,178],"optimization.":[57],"However,":[58],"current":[60],"DRL":[61,89,111,152,168,194],"based":[62],"face":[64],"limitations":[66],"minority-class":[68],"detection,":[69],"generalization":[70,185,261],"gap,":[71],"tuning":[73],"complexity.":[74],"This":[75,103],"paper":[76],"propose":[77,165],"GCB-PPO2":[78,228],"(Generative":[79],"Adversarial":[80,94,124],"Networks":[81,95],"CNNA-BiLSTM":[82],"Proximal":[83,98],"Policy":[84,99],"Optimization":[85,100],"2),":[86],"a":[87,120,166,171,206,210],"hybrid":[88,280],"system":[90],"synergistically":[91],"combining":[92],"Generative":[93,123],"(GAN)":[96],"2":[101],"(PPO2).":[102],"framework":[104,169],"integrates":[105],"three":[106],"innovations:":[107],"(1)":[108],"Unlike":[109,150,192],"prior":[110],"models":[112,153,283],"cannot":[113],"detect":[114],"low-frequency":[115],"attacks":[116],"correctly,":[117],"we":[118,164,204],"design":[119],"C-GAN":[121],"(Conditional":[122],"Networks)":[125],"generate":[128],"targeted":[129],"under-represented":[130,249],"samples":[132],"for":[133,145,237,248,263,277],"scenario":[136],"intentionally,":[137],"improving":[138],"recognition":[140],"accuracy":[141,232,267],"model":[144,229,257],"minority":[146],"classes":[147],"significantly.":[148],"(2)":[149],"existing":[151],"that":[154,196,227],"rely":[155],"on":[156,161,268],"single-modal":[157],"networks":[158],"experiment":[160],"single":[162],"datasets,":[163],"PPO2-based":[167],"with":[170,244],"CNN-LSTM":[172],"shared":[173],"optimize":[176],"dynamic":[177],"adaptation":[179],"while":[180,271],"capturing":[181],"spatio-temporal":[182],"patterns,":[183],"enhancing":[184],"ability":[186],"different":[188],"dynamics.":[190],"(3)":[191],"conventional":[193,279],"implementations":[195],"manually":[197],"tune":[198],"parameters":[199],"or":[200],"use":[201],"random":[202],"search,":[203],"embed":[205],"Bayesian":[207],"optimization":[208],"as":[209],"dedicated":[211],"hyper-parameter":[212],"auto-tuner,":[213],"systematically":[214],"resolving":[215],"sensitivity":[216],"bottlenecks":[217],"ensuring":[219],"robustness":[220],"fluctuating":[222],"environments.":[223],"Experimental":[224],"results":[225],"demonstrate":[226],"achieves":[230],"remarkable":[231],"99.92%":[234],"99.01%":[236],"binary":[238],"multiple":[240],"classification":[241],"scenarios,":[242],"respectively,":[243],"F1-scores":[245],"exceeding":[246],"85.91%":[247],"categories":[251],"InSDN":[253],"dataset.":[254],"Moreover,":[255],"proves":[258],"its":[259,273],"strong":[260],"capability":[262],"maintaining":[264],"over":[265],"98.65%":[266],"another":[269],"dataset,":[270],"confirming":[272],"improved":[274],"training":[275,289],"efficiency":[276],"surpassing":[278],"deep":[281],"learning":[282],"by":[284],"more":[285],"than":[286],"22.27%":[287],"time.":[290]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
