{"id":"https://openalex.org/W4413792329","doi":"https://doi.org/10.1145/3764586","title":"Adaptive Network Intrusion Detection Using Reinforcement Learning with Proximal Policy Optimization","display_name":"Adaptive Network Intrusion Detection Using Reinforcement Learning with Proximal Policy Optimization","publication_year":2025,"publication_date":"2025-08-28","ids":{"openalex":"https://openalex.org/W4413792329","doi":"https://doi.org/10.1145/3764586"},"language":"en","primary_location":{"id":"doi:10.1145/3764586","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3764586","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3764586","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3764586","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059295874","display_name":"Akshaya Suresh","orcid":"https://orcid.org/0009-0008-1578-2443"},"institutions":[{"id":"https://openalex.org/I180771373","display_name":"Government Medical College","ror":"https://ror.org/05w6g2m14","country_code":"IN","type":"education","lineage":["https://openalex.org/I180771373"]},{"id":"https://openalex.org/I4210095491","display_name":"Rubber Board","ror":"https://ror.org/00kn94t37","country_code":"IN","type":"government","lineage":["https://openalex.org/I4210095491"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Akshaya Suresh","raw_affiliation_strings":["Cyber Security, Indian Institute of Information Technology Kottayam","Cyber Security, Indian Institute of Information Technology Kottayam, Kottayam, India"],"affiliations":[{"raw_affiliation_string":"Cyber Security, Indian Institute of Information Technology Kottayam","institution_ids":["https://openalex.org/I4210095491"]},{"raw_affiliation_string":"Cyber Security, Indian Institute of Information Technology Kottayam, Kottayam, India","institution_ids":["https://openalex.org/I4210095491","https://openalex.org/I180771373"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076679531","display_name":"Arun Cyril Jose","orcid":"https://orcid.org/0000-0003-0381-2138"},"institutions":[{"id":"https://openalex.org/I180771373","display_name":"Government Medical College","ror":"https://ror.org/05w6g2m14","country_code":"IN","type":"education","lineage":["https://openalex.org/I180771373"]},{"id":"https://openalex.org/I4210095491","display_name":"Rubber Board","ror":"https://ror.org/00kn94t37","country_code":"IN","type":"government","lineage":["https://openalex.org/I4210095491"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arun Cyril Jose","raw_affiliation_strings":["Cyber Security, Indian Institute of Information Technology Kottayam","Cyber Security, Indian Institute of Information Technology Kottayam, Kottayam, India"],"affiliations":[{"raw_affiliation_string":"Cyber Security, Indian Institute of Information Technology Kottayam","institution_ids":["https://openalex.org/I4210095491"]},{"raw_affiliation_string":"Cyber Security, Indian Institute of Information Technology Kottayam, Kottayam, India","institution_ids":["https://openalex.org/I4210095491","https://openalex.org/I180771373"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059295874"],"corresponding_institution_ids":["https://openalex.org/I180771373","https://openalex.org/I4210095491"],"apc_list":null,"apc_paid":null,"fwci":2.7531,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.91920933,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"28","issue":"4","first_page":"1","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8445559740066528},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8286054730415344},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6893157958984375},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6595143675804138},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6530942916870117},{"id":"https://openalex.org/keywords/overfitting","display_name":"Overfitting","score":0.5939982533454895},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.4762937128543854},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4133950471878052},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3547017574310303},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3068324327468872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8445559740066528},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8286054730415344},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6893157958984375},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6595143675804138},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6530942916870117},{"id":"https://openalex.org/C22019652","wikidata":"https://www.wikidata.org/wiki/Q331309","display_name":"Overfitting","level":3,"score":0.5939982533454895},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.4762937128543854},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4133950471878052},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3547017574310303},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3068324327468872}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3764586","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3764586","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3764586","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3764586","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3764586","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3764586","source":{"id":"https://openalex.org/S4210174050","display_name":"ACM Transactions on Privacy and Security","issn_l":"2471-2566","issn":["2471-2566","2471-2574"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Privacy and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413792329.pdf","grobid_xml":"https://content.openalex.org/works/W4413792329.grobid-xml"},"referenced_works_count":67,"referenced_works":["https://openalex.org/W43382659","https://openalex.org/W1980492854","https://openalex.org/W1987452939","https://openalex.org/W2007178835","https://openalex.org/W2034996255","https://openalex.org/W2099419573","https://openalex.org/W2102805256","https://openalex.org/W2132366653","https://openalex.org/W2295598076","https://openalex.org/W2296509296","https://openalex.org/W2323599384","https://openalex.org/W2324338818","https://openalex.org/W2334791991","https://openalex.org/W2538830880","https://openalex.org/W2574388714","https://openalex.org/W2729537186","https://openalex.org/W2767547957","https://openalex.org/W2783741806","https://openalex.org/W2793888044","https://openalex.org/W2883457276","https://openalex.org/W2911964244","https://openalex.org/W2912325709","https://openalex.org/W2940895343","https://openalex.org/W2941898360","https://openalex.org/W2943971163","https://openalex.org/W2964278775","https://openalex.org/W2980576170","https://openalex.org/W2990740617","https://openalex.org/W3002842489","https://openalex.org/W3005805195","https://openalex.org/W3035965352","https://openalex.org/W3038955483","https://openalex.org/W3048313003","https://openalex.org/W3088111023","https://openalex.org/W3094948551","https://openalex.org/W3101894954","https://openalex.org/W3105682467","https://openalex.org/W3119264617","https://openalex.org/W3119524937","https://openalex.org/W3152346276","https://openalex.org/W3203436613","https://openalex.org/W3214029542","https://openalex.org/W3216772467","https://openalex.org/W4205413245","https://openalex.org/W4206116579","https://openalex.org/W4211007328","https://openalex.org/W4214821016","https://openalex.org/W4252939763","https://openalex.org/W4287815740","https://openalex.org/W4291127179","https://openalex.org/W4297964528","https://openalex.org/W4308032682","https://openalex.org/W4309173386","https://openalex.org/W4312419687","https://openalex.org/W4321484315","https://openalex.org/W4323545743","https://openalex.org/W4352976871","https://openalex.org/W4362587694","https://openalex.org/W4381322804","https://openalex.org/W4389140876","https://openalex.org/W4389408648","https://openalex.org/W4389584681","https://openalex.org/W4390811138","https://openalex.org/W4399647325","https://openalex.org/W4407944619","https://openalex.org/W6925701896","https://openalex.org/W6963873055"],"related_works":["https://openalex.org/W4362597605","https://openalex.org/W1574414179","https://openalex.org/W4297676672","https://openalex.org/W3009056573","https://openalex.org/W2922073769","https://openalex.org/W4281702477","https://openalex.org/W2490526372","https://openalex.org/W4376166922","https://openalex.org/W4378510483","https://openalex.org/W2150029999"],"abstract_inverted_index":{"In":[0],"an":[1,90,113,119],"increasingly":[2],"digital":[3],"and":[4,37,46,75,110,118,123,149,162,180,189],"interconnected":[5],"world,":[6],"the":[7,66,86,136,154,166,194],"need":[8],"for":[9,160],"robust":[10],"network":[11,27],"intrusion":[12,28],"detection":[13,29,44,94,139],"systems":[14],"is":[15,82,133],"crucial":[16],"to":[17,26,42,59,84,89,168],"ensure":[18],"cybersecurity.":[19],"This":[20],"article":[21],"presents":[22],"a":[23,55,78],"novel":[24,150],"approach":[25],"that":[30,173],"integrates":[31],"both":[32,147],"traditional":[33,174],"machine":[34],"learning":[35,40,57,158],"methods":[36,140],"advanced":[38],"reinforcement":[39,56,157],"techniques":[41],"enhance":[43],"capabilities":[45],"accuracy.":[47],"The":[48,96,130,178],"proposed":[49,131],"system":[50,167],"uses":[51],"Proximal":[52],"Policy":[53],"Optimization,":[54],"algorithm,":[58],"dynamically":[60],"adjust":[61],"ensemble":[62],"weights,":[63],"thereby":[64],"optimizing":[65],"contributions":[67],"of":[68,116,125,156],"base":[69],"learners,":[70],"such":[71],"as":[72],"Random":[73],"Forest":[74],"CatBoost.":[76],"Additionally,":[77],"Multi-layer":[79],"Perceptron-based":[80],"meta-learner":[81],"employed":[83],"refine":[85],"predictions,":[87],"leading":[88],"overall":[91],"improvement":[92],"in":[93,145],"performance.":[95],"model":[97],"was":[98],"evaluated":[99],"on":[100],"five":[101],"diverse":[102],"datasets,":[103],"including":[104],"NSL-KDD,":[105],"CICIDS,":[106],"TON":[107],"IoT,":[108],"DDoS,":[109],"UNSW-NB15,":[111],"achieving":[112],"average":[114,120],"accuracy":[115],"97.16%,":[117],"precision,":[121],"recall,":[122],"F1-score":[124],"97%":[126],"across":[127,183],"all":[128,184],"datasets.":[129],"work":[132],"compared":[134],"with":[135],"existing":[137],"state-of-the-art":[138],"demonstrating":[141],"its":[142],"better":[143],"performance":[144],"detecting":[146],"known":[148],"attack":[151,171],"types.":[152],"Furthermore,":[153],"integration":[155],"allowed":[159],"dynamic":[161],"context-sensitive":[163],"decision-making,":[164],"enabling":[165],"handle":[169],"complex":[170],"patterns":[172],"models":[175],"struggle":[176],"with.":[177],"training":[179],"validation":[181],"results":[182],"datasets":[185],"showed":[186],"rapid":[187],"convergence":[188],"minimal":[190],"overfitting,":[191],"further":[192],"supporting":[193],"model\u2019s":[195],"robustness.":[196]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
