{"id":"https://openalex.org/W4310113673","doi":"https://doi.org/10.1145/3568562.3568660","title":"Leveraging AI-Driven Realtime Intrusion Detection by Using WGAN and XGBoost","display_name":"Leveraging AI-Driven Realtime Intrusion Detection by Using WGAN and XGBoost","publication_year":2022,"publication_date":"2022-11-29","ids":{"openalex":"https://openalex.org/W4310113673","doi":"https://doi.org/10.1145/3568562.3568660"},"language":"en","primary_location":{"id":"doi:10.1145/3568562.3568660","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3568562.3568660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003104041","display_name":"Hoang V. Vo","orcid":"https://orcid.org/0000-0001-9862-0088"},"institutions":[{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Hoang V.Vo","raw_affiliation_strings":["VNU University of Engineering and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0001-9862-0088","affiliations":[{"raw_affiliation_string":"VNU University of Engineering and Technology, Viet Nam","institution_ids":["https://openalex.org/I67868205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067546643","display_name":"Duong Huong Nguyen","orcid":"https://orcid.org/0000-0002-1000-2128"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]},{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Duong H. Nguyen","raw_affiliation_strings":["Academy of Cryptography Techniques, Viet Nam","VNU University of Engineering and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0002-1000-2128","affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques, Viet Nam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"VNU University of Engineering and Technology, Viet Nam","institution_ids":["https://openalex.org/I67868205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102865640","display_name":"Tuyen T. Nguyen","orcid":"https://orcid.org/0000-0003-1732-4928"},"institutions":[{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Tuyen T. Nguyen","raw_affiliation_strings":["VNU University of Engineering and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0003-1732-4928","affiliations":[{"raw_affiliation_string":"VNU University of Engineering and Technology, Viet Nam","institution_ids":["https://openalex.org/I67868205"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101905435","display_name":"Hoa N. Nguyen","orcid":"https://orcid.org/0000-0002-2565-281X"},"institutions":[{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Hoa N. Nguyen","raw_affiliation_strings":["VNU University of Engineering and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0002-2565-281X","affiliations":[{"raw_affiliation_string":"VNU University of Engineering and Technology, Viet Nam","institution_ids":["https://openalex.org/I67868205"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004642771","display_name":"Duan V. Nguyen","orcid":"https://orcid.org/0000-0002-8114-6735"},"institutions":[{"id":"https://openalex.org/I4210155035","display_name":"Academy of Cryptography Techniques","ror":"https://ror.org/05nfbnp91","country_code":"VN","type":"education","lineage":["https://openalex.org/I4210155035"]},{"id":"https://openalex.org/I67868205","display_name":"VNU University of Science","ror":"https://ror.org/05w54hk79","country_code":"VN","type":"education","lineage":["https://openalex.org/I177233841","https://openalex.org/I67868205"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Duan V. Nguyen","raw_affiliation_strings":["Academy of Cryptography Techniques, Viet Nam","VNU University of Engineering and Technology, Viet Nam"],"raw_orcid":"https://orcid.org/0000-0002-8114-6735","affiliations":[{"raw_affiliation_string":"Academy of Cryptography Techniques, Viet Nam","institution_ids":["https://openalex.org/I4210155035"]},{"raw_affiliation_string":"VNU University of Engineering and Technology, Viet Nam","institution_ids":["https://openalex.org/I67868205"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5003104041"],"corresponding_institution_ids":["https://openalex.org/I67868205"],"apc_list":null,"apc_paid":null,"fwci":1.1414,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.79653462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"208","last_page":"215"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8289266228675842},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7911192178726196},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.586477518081665},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5547689199447632},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.45680373907089233},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41853976249694824},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41431164741516113},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3474004566669464}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8289266228675842},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7911192178726196},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.586477518081665},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5547689199447632},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.45680373907089233},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41853976249694824},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41431164741516113},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3474004566669464},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3568562.3568660","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3568562.3568660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 11th International Symposium on Information and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1581587400","https://openalex.org/W2564619343","https://openalex.org/W2783190965","https://openalex.org/W2786075294","https://openalex.org/W2887955655","https://openalex.org/W2889885925","https://openalex.org/W2898943231","https://openalex.org/W2899653275","https://openalex.org/W2903051301","https://openalex.org/W2904096920","https://openalex.org/W2926701059","https://openalex.org/W2958285686","https://openalex.org/W3000225415","https://openalex.org/W3002193070","https://openalex.org/W3006165800","https://openalex.org/W3009253820","https://openalex.org/W3013542389","https://openalex.org/W3015108593","https://openalex.org/W3017251603","https://openalex.org/W3022558251","https://openalex.org/W3091285855","https://openalex.org/W3116274835","https://openalex.org/W3127161477","https://openalex.org/W3167041328","https://openalex.org/W3196862177","https://openalex.org/W3210656068","https://openalex.org/W4230861824","https://openalex.org/W4296499547","https://openalex.org/W4312554891","https://openalex.org/W4386648721","https://openalex.org/W4394670483","https://openalex.org/W6922421285"],"related_works":["https://openalex.org/W4375867731","https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W2364419519","https://openalex.org/W4380075502","https://openalex.org/W2017948608","https://openalex.org/W2360767377","https://openalex.org/W2360951146"],"abstract_inverted_index":{"Currently,":[0],"pattern-based":[1],"detection":[2,25,51],"is":[3,16,173],"difficult":[4],"to":[5,27,48,82,91,109,124,177],"detect":[6,178],"new":[7],"network":[8],"attacks":[9],"with":[10,29,42,145],"signatures.":[11],"Thus,":[12],"using":[13,127,160],"machine":[14],"learning":[15],"an":[17,43,138],"approach":[18],"proposed":[19],"by":[20,62,73,102],"many":[21],"researchers":[22],"for":[23,169],"intrusion":[24,50],"systems":[26],"deal":[28],"this":[30,54],"issue.":[31],"This":[32],"paper":[33],"presents":[34],"a":[35,39],"hybrid":[36],"method":[37,108],"combining":[38],"rule-based":[40,67],"inspector":[41,68],"AI-driven":[44],"model,":[45],"namely":[46],"WGID,":[47],"improve":[49],"performance.":[52],"In":[53],"method,":[55],"traffic":[56,171],"flows":[57],"that":[58,134],"are":[59],"not":[60],"triggered":[61],"any":[63],"rule":[64],"of":[65,141],"the":[66,74,79,89,93,98,106,111,116,135,146,161,165,181],"will":[69],"be":[70],"deeply":[71],"analyzed":[72],"WGID-based":[75],"inspector.":[76],"WGID":[77,104,117,126,136],"comprises":[78],"TWGAN":[80],"algorithm":[81],"generate":[83],"more":[84],"coherent":[85],"samples":[86],"based":[87],"on":[88,97],"WGAN":[90],"tackle":[92],"imbalanced":[94],"dataset.":[95],"Based":[96],"training":[99],"dataset":[100],"augmented":[101],"TWGAN,":[103],"adopts":[105],"XGBoost":[107],"perform":[110],"deep":[112,166],"analysis.":[113],"To":[114],"demonstrate":[115],"performance,":[118],"we":[119],"conduct":[120],"different":[121],"rigorous":[122],"experiments":[123],"evaluate":[125],"three":[128],"well-known":[129],"datasets.":[130,163],"The":[131],"results":[132],"indicate":[133],"achieves":[137],"excellent":[139],"accuracy":[140],",":[142,143],"and":[144,149],"CSE-CIC-IDS2018,":[147],"NSL-KDD,":[148],"UGR":[150],"datasets,":[151],"respectively.":[152],"It":[153],"also":[154,174],"performs":[155],"better":[156],"than":[157],"related":[158],"models":[159],"same":[162],"Moreover,":[164],"inspection":[167],"time":[168],"each":[170],"flow":[172],"small":[175],"enough":[176],"intrusions":[179],"in":[180],"inline":[182],"mode":[183],"(i.e.,":[184],"average":[185],"1.892\u03bcs/flow).":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
