{"id":"https://openalex.org/W4402513146","doi":"https://doi.org/10.1145/3688574.3688578","title":"Toward Deep Learning based Intrusion Detection System: A Survey","display_name":"Toward Deep Learning based Intrusion Detection System: A Survey","publication_year":2024,"publication_date":"2024-07-24","ids":{"openalex":"https://openalex.org/W4402513146","doi":"https://doi.org/10.1145/3688574.3688578"},"language":"en","primary_location":{"id":"doi:10.1145/3688574.3688578","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688574.3688578","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big Data Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1145/3688574.3688578","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022807734","display_name":"Zhiqi Li","orcid":"https://orcid.org/0000-0003-2160-6418"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210147322","display_name":"Shanghai Institute of Microsystem and Information Technology","ror":"https://ror.org/04nytyj38","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210147322"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiqi Li","raw_affiliation_strings":["Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210147322","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027596343","display_name":"Weidong Fang","orcid":"https://orcid.org/0000-0002-9139-2892"},"institutions":[{"id":"https://openalex.org/I4210147322","display_name":"Shanghai Institute of Microsystem and Information Technology","ror":"https://ror.org/04nytyj38","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210147322"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weidong Fang","raw_affiliation_strings":["Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rShanghai Research and Development Center for Micro-Nano Electronics, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rShanghai Research and Development Center for Micro-Nano Electronics, China","institution_ids":["https://openalex.org/I4210147322"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038265266","display_name":"Chunsheng Zhu","orcid":"https://orcid.org/0000-0001-8041-0197"},"institutions":[{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunsheng Zhu","raw_affiliation_strings":["Shenzhen Technology University, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Technology University, China","institution_ids":["https://openalex.org/I4210152380"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049645428","display_name":"Guannan Song","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guannan Song","raw_affiliation_strings":["Shuiyan Microsystem and Information Technology, Co., Ltd.,, China"],"affiliations":[{"raw_affiliation_string":"Shuiyan Microsystem and Information Technology, Co., Ltd.,, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051763346","display_name":"Wuxiong Zhang","orcid":"https://orcid.org/0000-0002-5084-3351"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210147322","display_name":"Shanghai Institute of Microsystem and Information Technology","ror":"https://ror.org/04nytyj38","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210147322"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wuxiong Zhang","raw_affiliation_strings":["Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, China and \rUniversity of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210147322","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022807734"],"corresponding_institution_ids":["https://openalex.org/I4210147322","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.9306,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91733558,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7656334042549133},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6797699928283691},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4843484163284302},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4223952889442444},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.4148041605949402}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7656334042549133},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6797699928283691},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4843484163284302},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4223952889442444},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.4148041605949402}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3688574.3688578","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688574.3688578","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big Data Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3688574.3688578","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3688574.3688578","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Conference on Big Data Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W3039684673","https://openalex.org/W3093410479","https://openalex.org/W3119529645","https://openalex.org/W3121084507","https://openalex.org/W3151838147","https://openalex.org/W3161369593","https://openalex.org/W3165574415","https://openalex.org/W3167979994","https://openalex.org/W3183116885","https://openalex.org/W3185244527","https://openalex.org/W3193327991","https://openalex.org/W3197983285","https://openalex.org/W3209216135","https://openalex.org/W3210846950","https://openalex.org/W3213755975","https://openalex.org/W4205185666","https://openalex.org/W4205416355","https://openalex.org/W4205957238","https://openalex.org/W4210256856","https://openalex.org/W4211180396","https://openalex.org/W4214610633","https://openalex.org/W4220957574","https://openalex.org/W4224285223","https://openalex.org/W4282599181","https://openalex.org/W4285157251","https://openalex.org/W4319316768","https://openalex.org/W4321497036","https://openalex.org/W4323362877","https://openalex.org/W4323545679","https://openalex.org/W4365513113","https://openalex.org/W4380682492","https://openalex.org/W4384303967","https://openalex.org/W4385975767","https://openalex.org/W4386850845","https://openalex.org/W4387415362","https://openalex.org/W4388011607","https://openalex.org/W4389513574"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4321369474","https://openalex.org/W4360585206","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W4323565446"],"abstract_inverted_index":{"As":[0],"a":[1,36],"pivotal":[2],"defense":[3],"mechanism":[4],"against":[5],"cyber-attacks,":[6],"the":[7,29,51,64,80,110,121,126,129,145],"intrusion":[8],"detection":[9],"system":[10],"(IDS)":[11],"is":[12,133],"widely":[13],"recognized.":[14],"The":[15],"remarkable":[16],"accuracy":[17,88],"exhibited":[18],"by":[19],"IDS":[20,44,61],"in":[21,38,59,95,144],"detecting":[22],"various":[23],"types":[24],"of":[25,31,82],"intrusions,":[26],"owing":[27],"to":[28,50],"leverage":[30],"deep":[32],"learning":[33],"(DL),":[34],"prompts":[35],"surge":[37],"research":[39,137],"endeavors":[40],"aimed":[41],"at":[42],"DL-based":[43,60],"design.":[45],"To":[46],"facilitate":[47],"researchers'":[48],"access":[49],"latest":[52],"breakthroughs,":[53],"we":[54],"delve":[55],"into":[56,72],"recent":[57],"advancements":[58],"proposed":[62],"over":[63],"past":[65],"years.":[66],"These":[67],"works":[68,141],"are":[69,107,142],"systematically":[70],"categorized":[71],"two":[73],"main":[74],"application":[75],"domains:":[76],"computer":[77],"networks":[78],"and":[79,85,91,105,113,135],"Internet":[81],"Things":[83],"(IoT),":[84],"their":[86],"methodology,":[87],"performance,":[89],"advantages,":[90],"disadvantages":[92],"undergo":[93],"scrutiny":[94],"each":[96],"work,":[97],"fostering":[98],"an":[99],"insightful":[100],"comparison.":[101],"Subsequently,":[102],"meticulous":[103],"examination":[104],"deliberation":[106],"conducted":[108],"on":[109],"shared":[111],"traits":[112],"distinctive":[114],"features":[115],"across":[116],"these":[117],"works.":[118],"Drawing":[119],"from":[120,125],"collective":[122],"insights":[123],"gleaned":[124],"reviewed":[127],"literature,":[128],"current":[130],"developmental":[131],"landscape":[132],"synthesized,":[134],"prospective":[136],"directions":[138],"for":[139],"future":[140],"delineated":[143],"conclusion.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
