{"id":"https://openalex.org/W4410058271","doi":"https://doi.org/10.32604/cmc.2025.064833","title":"DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme","display_name":"DEMGAN: A Machine Learning-Based Intrusion Detection System Evasion Scheme","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410058271","doi":"https://doi.org/10.32604/cmc.2025.064833"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064833","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064833","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064833","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069135905","display_name":"Dawei Xu","orcid":"https://orcid.org/0000-0003-4422-0606"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dawei Xu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102306725","display_name":"Yue Lv","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yue Lv","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100340891","display_name":"Min Wang","orcid":"https://orcid.org/0000-0002-1580-6387"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Min Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101635898","display_name":"Baokun Zheng","orcid":"https://orcid.org/0000-0003-3333-9281"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baokun Zheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100398385","display_name":"Jian Zhao","orcid":"https://orcid.org/0000-0001-9829-784X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jian Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5102013728","display_name":"Jiaxuan Yu","orcid":"https://orcid.org/0000-0001-7150-3789"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiaxuan Yu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5069135905"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.5458,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82909283,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"84","issue":"1","first_page":"1731","last_page":"1746"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/evasion","display_name":"Evasion (ethics)","score":0.8054637908935547},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6952707767486572},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6912112236022949},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6190568804740906},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45224225521087646},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.41703057289123535},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12610012292861938},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.09242299199104309},{"id":"https://openalex.org/keywords/immunology","display_name":"Immunology","score":0.05617791414260864}],"concepts":[{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.8054637908935547},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6952707767486572},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6912112236022949},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6190568804740906},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45224225521087646},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.41703057289123535},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12610012292861938},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.09242299199104309},{"id":"https://openalex.org/C203014093","wikidata":"https://www.wikidata.org/wiki/Q101929","display_name":"Immunology","level":1,"score":0.05617791414260864},{"id":"https://openalex.org/C8891405","wikidata":"https://www.wikidata.org/wiki/Q1059","display_name":"Immune system","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064833","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064833","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064833","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064833","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2478708596","https://openalex.org/W2963448658","https://openalex.org/W3084487255","https://openalex.org/W3096831136","https://openalex.org/W4285148832","https://openalex.org/W4292980344","https://openalex.org/W4295539309","https://openalex.org/W4296149706","https://openalex.org/W4306180880","https://openalex.org/W4312384107","https://openalex.org/W4379382416","https://openalex.org/W4386065314","https://openalex.org/W4386275697","https://openalex.org/W4386736581","https://openalex.org/W4388407457","https://openalex.org/W4388505134","https://openalex.org/W4392029839"],"related_works":["https://openalex.org/W2808001300","https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W1548771250","https://openalex.org/W4387369504","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694"],"abstract_inverted_index":{"Network":[0,40,121],"intrusion":[1],"detection":[2],"systems":[3],"(IDS)":[4],"are":[5,26],"a":[6,109],"prevalent":[7],"method":[8,142,156],"for":[9],"safeguarding":[10],"network":[11,68,131,222],"traffic":[12,69,132],"against":[13,143,217],"attacks.":[14],"However,":[15],"existing":[16],"IDS":[17,127,146,177,210],"primarily":[18],"depend":[19],"on":[20,43],"machine":[21],"learning":[22],"(ML)":[23],"models,":[24],"which":[25],"vulnerable":[27],"to":[28,50,72,84,103,188],"evasion":[29,163],"through":[30],"adversarial":[31,52,111,181,190],"examples.":[32,53],"In":[33],"recent":[34],"years,":[35],"the":[36,61,79,88,91,137,176,179,185,206,209,214],"Wasserstein":[37,44],"Generative":[38,119],"Adversarial":[39,120],"(WGAN),":[41],"based":[42],"distance,":[45],"has":[46],"been":[47],"extensively":[48],"utilized":[49],"generate":[51],"Nevertheless,":[54],"several":[55],"challenges":[56],"persist:":[57],"(1)":[58],"WGAN":[59,95,102],"experiences":[60],"mode":[62],"collapse":[63],"problem":[64],"when":[65],"generating":[66],"multi-category":[67],"data,":[70],"leading":[71],"subpar":[73],"quality":[74],"and":[75,107,167],"insufficient":[76],"diversity":[77],"in":[78,193],"generated":[80,180],"data;":[81],"(2)":[82],"Due":[83],"unstable":[85],"training":[86],"processes,":[87],"authenticity":[89],"of":[90,139,165,199,208],"data":[92,133],"produced":[93],"by":[94,128],"is":[96],"often":[97],"low.":[98],"This":[99,201],"study":[100],"improves":[101],"address":[104],"these":[105],"issues":[106],"proposes":[108],"new":[110],"sample":[112],"generation":[113],"algorithm":[114],"called":[115],"Distortion":[116],"Enhanced":[117],"Multi-Generator":[118],"(DEMGAN).":[122],"DEMGAN":[123],"effectively":[124],"evades":[125],"ML-based":[126,145],"proficiently":[129],"obfuscating":[130],"samples.":[134],"We":[135],"assess":[136],"efficacy":[138],"our":[140,155],"attack":[141],"five":[144],"using":[147],"two":[148],"public":[149],"datasets.":[150],"The":[151],"results":[152],"demonstrate":[153],"that":[154,174],"can":[157],"successfully":[158],"bypass":[159],"IDS,":[160],"achieving":[161],"average":[162,195],"rates":[164],"97.42%":[166],"87.51%,":[168],"respectively.":[169],"Furthermore,":[170],"empirical":[171],"findings":[172],"indicate":[173],"retraining":[175],"with":[178],"samples":[182],"significantly":[183],"bolsters":[184],"system\u2019s":[186],"capability":[187],"detect":[189],"samples,":[191],"resulting":[192],"an":[194],"recognition":[196],"rate":[197],"increase":[198],"86.78%.":[200],"approach":[202],"not":[203],"only":[204],"enhances":[205],"performance":[207],"but":[211],"also":[212],"strengthens":[213],"network\u2019s":[215],"resilience":[216],"potential":[218],"threats,":[219],"thereby":[220],"optimizing":[221],"security":[223],"measures.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
