{"id":"https://openalex.org/W4411098853","doi":"https://doi.org/10.1145/3723178.3723318","title":"Network-Shield: Exploring the Efficacy of GRU Model in Intrusion Detection Using CIC-IDS 2018 Dataset","display_name":"Network-Shield: Exploring the Efficacy of GRU Model in Intrusion Detection Using CIC-IDS 2018 Dataset","publication_year":2024,"publication_date":"2024-10-17","ids":{"openalex":"https://openalex.org/W4411098853","doi":"https://doi.org/10.1145/3723178.3723318"},"language":"en","primary_location":{"id":"doi:10.1145/3723178.3723318","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3723178.3723318","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723318","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computing Advancements","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723318","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117857399","display_name":"Md. Ashik Elahi","orcid":null},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Md. Ashik Elahi","raw_affiliation_strings":["Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh"],"raw_orcid":"https://orcid.org/0009-0003-0691-0136","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116871234","display_name":"Rafi Ahammed Songram","orcid":null},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Rafi Ahammed Songram","raw_affiliation_strings":["Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh"],"raw_orcid":"https://orcid.org/0009-0009-0569-1393","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]},{"author_position":"last","author":{"id":null,"display_name":"Md Shahid Uz Zaman","orcid":"https://orcid.org/0000-0002-9690-4711"},"institutions":[{"id":"https://openalex.org/I17477748","display_name":"Rajshahi University of Engineering and Technology","ror":"https://ror.org/049ysg747","country_code":"BD","type":"education","lineage":["https://openalex.org/I17477748"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Md Shahid Uz Zaman","raw_affiliation_strings":["Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh"],"raw_orcid":"https://orcid.org/0000-0002-9690-4711","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Rajshahi University of Engineering &amp; Technology, Rajshahi, Bangladesh","institution_ids":["https://openalex.org/I17477748"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5117857399"],"corresponding_institution_ids":["https://openalex.org/I17477748"],"apc_list":null,"apc_paid":null,"fwci":0.3364,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66643083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1058","last_page":"1065"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7151497602462769},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.647391676902771},{"id":"https://openalex.org/keywords/shield","display_name":"Shield","score":0.6327423453330994},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5911277532577515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4101124405860901},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.200321227312088},{"id":"https://openalex.org/keywords/petrology","display_name":"Petrology","score":0.04453882575035095}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7151497602462769},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.647391676902771},{"id":"https://openalex.org/C138081364","wikidata":"https://www.wikidata.org/wiki/Q852013","display_name":"Shield","level":2,"score":0.6327423453330994},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5911277532577515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4101124405860901},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.200321227312088},{"id":"https://openalex.org/C5900021","wikidata":"https://www.wikidata.org/wiki/Q163082","display_name":"Petrology","level":1,"score":0.04453882575035095},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3723178.3723318","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3723178.3723318","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723318","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computing Advancements","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3723178.3723318","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3723178.3723318","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3723178.3723318","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Computing Advancements","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.7200000286102295,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411098853.pdf","grobid_xml":"https://content.openalex.org/works/W4411098853.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1985987493","https://openalex.org/W2399941526","https://openalex.org/W2732560875","https://openalex.org/W2926701059","https://openalex.org/W2952066300","https://openalex.org/W2962910311","https://openalex.org/W2980759501","https://openalex.org/W2994866269","https://openalex.org/W3000367805","https://openalex.org/W3031078472","https://openalex.org/W3093410479","https://openalex.org/W3171802458","https://openalex.org/W4254984988","https://openalex.org/W4309346044","https://openalex.org/W4367358593","https://openalex.org/W4387423597"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W191020423","https://openalex.org/W212028160","https://openalex.org/W4388071457","https://openalex.org/W2384581482","https://openalex.org/W4379056371","https://openalex.org/W4224273067","https://openalex.org/W2133389611"],"abstract_inverted_index":{"In":[0],"today's":[1],"interconnected":[2],"digital":[3],"landscape,":[4],"protecting":[5],"network":[6,46,135],"systems":[7],"from":[8,57],"malicious":[9],"intrusions":[10],"is":[11,20],"vital.Despite":[12],"the":[13,34,41,50,58,64,90,97,104,107,110,113,116,125,151,158],"increasing":[14],"prevalence":[15],"of":[16,36,92,106,115,127,142,153],"cyber":[17],"dangers,":[18],"it":[19,167,177],"crucial":[21],"to":[22,88],"have":[23,53],"strong":[24],"and":[25,148,170,184],"reliable":[26],"intrusion":[27,47,136],"detection":[28,48],"systems.In":[29],"this":[30,179],"work":[31],"we":[32,95],"investigates":[33],"effectiveness":[35,126],"utilizing":[37],"deep":[38],"learning,":[39],"namely":[40],"Gated":[42],"Recurrent":[43],"Unit,":[44],"for":[45,120,173],"using":[49],"CIC-IDS2018":[51],"dataset.We":[52],"included":[54],"all":[55],"classes":[56,67],"dataset":[59],"in":[60,70,134,192],"our":[61],"study,":[62],"addressing":[63],"often-overlooked":[65],"minor":[66,77],"typically":[68],"excluded":[69],"similar":[71],"research.The":[72],"study":[73,111],"concentrates":[74],"on":[75],"identifying":[76],"attacks":[78],"that,":[79],"although":[80],"not":[81],"common,":[82],"represent":[83],"considerable":[84],"security":[85],"threats.In":[86],"order":[87],"address":[89],"issue":[91],"imbalanced":[93],"datasets,":[94],"utilize":[96],"Synthetic":[98],"Minority":[99],"Over-sampling":[100],"technique,":[101],"which":[102],"improves":[103],"accuracy":[105,141],"model.In":[108],"addition,":[109],"examines":[112],"application":[114],"Random":[117],"Forest":[118],"algorithm":[119],"selecting":[121],"features,":[122],"hence":[123],"enhancing":[124],"detection.Our":[128],"proposed":[129],"method":[130],"demonstrates":[131],"exceptional":[132],"performance":[133],"detection,":[137],"achieving":[138],"an":[139],"impressive":[140],"96.23%":[143],"along":[144],"with":[145,181],"remarkable":[146],"precision":[147],"recall":[149],"scores.Through":[150],"utilization":[152],"a":[154,168],"condensed":[155],"feature":[156],"set,":[157],"model":[159],"optimizes":[160],"computational":[161],"efficiency":[162],"without":[163],"sacrificing":[164],"precision,":[165],"rendering":[166],"pragmatic":[169],"potent":[171],"solution":[172],"real-world":[174],"cybersecurity":[175,193],"tasks.Furthermore,":[176],"achieves":[178],"objective":[180],"fewer":[182],"parameters":[183],"reduced":[185],"storage":[186],"requirements,":[187],"affirming":[188],"its":[189],"practical":[190],"utility":[191],"applications.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
