{"id":"https://openalex.org/W4411159859","doi":"https://doi.org/10.32604/cmc.2025.065031","title":"Addressing Modern Cybersecurity Challenges: A Hybrid Machine Learning and Deep Learning Approach for Network Intrusion Detection","display_name":"Addressing Modern Cybersecurity Challenges: A Hybrid Machine Learning and Deep Learning Approach for Network Intrusion Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411159859","doi":"https://doi.org/10.32604/cmc.2025.065031"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065031","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065031","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065031","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006873414","display_name":"Khadija Bouzaachane","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Khadija Bouzaachane","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086286640","display_name":"El Mahdi El Guarmah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"El Mahdi El Guarmah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077724667","display_name":"Abdullah M. Alnajim","orcid":"https://orcid.org/0000-0003-3223-1105"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdullah M. Alnajim","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5057997579","display_name":"Sheroz Khan","orcid":"https://orcid.org/0000-0002-5749-8538"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sheroz Khan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006873414"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.0575,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.91877369,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"84","issue":"2","first_page":"2391","last_page":"2410"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9315000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9016000032424927,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7345801591873169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6295077204704285},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5884245038032532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5824555158615112},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47368907928466797},{"id":"https://openalex.org/keywords/learning-network","display_name":"Learning network","score":0.4650375247001648},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.43049079179763794},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.4254816770553589},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3545542061328888},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.0585724413394928}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7345801591873169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6295077204704285},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5884245038032532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5824555158615112},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47368907928466797},{"id":"https://openalex.org/C2987015589","wikidata":"https://www.wikidata.org/wiki/Q1040098","display_name":"Learning network","level":2,"score":0.4650375247001648},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.43049079179763794},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.4254816770553589},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3545542061328888},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0585724413394928},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065031","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065031","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065031","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065031","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2153268908","https://openalex.org/W2962883549","https://openalex.org/W3006165800","https://openalex.org/W3033403042","https://openalex.org/W3043530913","https://openalex.org/W3085230347","https://openalex.org/W3102359135","https://openalex.org/W3109205935","https://openalex.org/W3119693685","https://openalex.org/W3120548213","https://openalex.org/W3126814579","https://openalex.org/W3176102326","https://openalex.org/W4205884137","https://openalex.org/W4206713037","https://openalex.org/W4220846496","https://openalex.org/W4323074452","https://openalex.org/W4365790371","https://openalex.org/W4384557563","https://openalex.org/W4386223270","https://openalex.org/W4390616416","https://openalex.org/W4390909962","https://openalex.org/W4396949693","https://openalex.org/W4404568107"],"related_works":["https://openalex.org/W2392603527","https://openalex.org/W2390009783","https://openalex.org/W2348767155","https://openalex.org/W2388497169","https://openalex.org/W3120393658","https://openalex.org/W4283700121","https://openalex.org/W1496376327","https://openalex.org/W2357468538","https://openalex.org/W1513478798","https://openalex.org/W2133389611"],"abstract_inverted_index":{"The":[0,90,178],"rapid":[1],"increase":[2],"in":[3,16,158,193],"the":[4,50,67,93,139,181,184],"number":[5],"of":[6,8,52,69,141,148,183],"Internet":[7],"Things":[9],"(IoT)":[10],"devices,":[11],"coupled":[12],"with":[13],"a":[14,27,35,84,96,155,207],"rise":[15],"sophisticated":[17],"cyberattacks,":[18],"demands":[19],"robust":[20,209],"intrusion":[21,30,103,149,160,194,212],"detection":[22,31,104,161,195,213],"systems.":[23,57],"This":[24,81,199],"study":[25],"presents":[26],"holistic,":[28],"intelligent":[29],"system.":[32,188],"It":[33,189],"uses":[34],"combined":[36],"method":[37],"that":[38,162],"integrates":[39,66],"machine":[40],"learning":[41,45,71,77,119,132],"(ML)":[42],"and":[43,75,87,126,169,197,210],"deep":[44,76],"(DL)":[46],"techniques":[47,173],"to":[48,137,203],"improve":[49],"protection":[51],"contemporary":[53],"information":[54],"technology":[55],"(IT)":[56],"Unlike":[58],"traditional":[59],"signature-based":[60],"or":[61],"single-model":[62],"methods,":[63],"this":[64],"system":[65],"strengths":[68],"ensemble":[70,118],"for":[72,78,100,128,145],"binary":[73,129],"classification":[74],"multi-class":[79,142,159],"classification.":[80,130],"combination":[82],"provides":[83],"more":[85,208],"nuanced":[86],"adaptable":[88,211],"defense.":[89],"research":[91,200],"utilizes":[92],"NF-UQ-NIDS-v2":[94],"dataset,":[95],"recent,":[97],"comprehensive":[98],"benchmark":[99],"evaluating":[101],"network":[102],"systems":[105],"(NIDS).":[106],"Our":[107],"methodological":[108],"framework":[109],"employs":[110],"advanced":[111],"artificial":[112],"intelligence":[113],"techniques.":[114],"Specifically,":[115],"we":[116,166],"use":[117,167],"algorithms":[120],"(Random":[121],"Forest,":[122],"Gradient":[123],"Boosting,":[124],"AdaBoost,":[125],"XGBoost)":[127],"Deep":[131],"architectures":[133],"are":[134],"also":[135],"employed":[136],"address":[138],"complexities":[140],"classification,":[143],"allowing":[144],"fine-grained":[146],"identification":[147],"types.":[150],"To":[151],"mitigate":[152],"class":[153,176],"imbalance,":[154],"common":[156],"problem":[157],"biases":[163],"model":[164],"performance,":[165],"oversampling":[168],"data":[170],"augmentation.":[171],"These":[172],"ensure":[174],"equitable":[175],"representation.":[177],"results":[179],"demonstrate":[180],"efficacy":[182],"proposed":[185],"hybrid":[186],"ML-DL":[187],"achieves":[190],"significant":[191],"improvements":[192],"accuracy":[196],"reliability.":[198],"contributes":[201],"substantively":[202],"cybersecurity":[204],"by":[205],"providing":[206],"solution.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
