{"id":"https://openalex.org/W4409115149","doi":"https://doi.org/10.3389/fcomp.2025.1574211","title":"IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic","display_name":"IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic","publication_year":2025,"publication_date":"2025-04-03","ids":{"openalex":"https://openalex.org/W4409115149","doi":"https://doi.org/10.3389/fcomp.2025.1574211"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2025.1574211","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1574211","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3389/fcomp.2025.1574211","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006974876","display_name":"Lizhong Jin","orcid":"https://orcid.org/0000-0003-4193-622X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lizhong Jin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Rulong Fan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rulong Fan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101761581","display_name":"Xiaoling Han","orcid":"https://orcid.org/0009-0000-9618-9626"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaoling Han","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5057991039","display_name":"Xueying Cui","orcid":"https://orcid.org/0009-0007-3182-8299"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xueying Cui","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5006974876"],"corresponding_institution_ids":[],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":4.1084,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.93483546,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"7","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5889263153076172},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.5859898924827576},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49240076541900635},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4892263412475586},{"id":"https://openalex.org/keywords/gravitation","display_name":"Gravitation","score":0.4399663507938385},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3718908131122589},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.18584328889846802},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.14927297830581665},{"id":"https://openalex.org/keywords/astronomy","display_name":"Astronomy","score":0.08633920550346375}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5889263153076172},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.5859898924827576},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49240076541900635},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4892263412475586},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.4399663507938385},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3718908131122589},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.18584328889846802},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.14927297830581665},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.08633920550346375},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3389/fcomp.2025.1574211","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1574211","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:22cc9452df284379afd10fc3038826b0","is_oa":true,"landing_page_url":"https://doaj.org/article/22cc9452df284379afd10fc3038826b0","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 7 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2025.1574211","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2025.1574211","pdf_url":null,"source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1977838479","https://openalex.org/W1997600725","https://openalex.org/W2006441287","https://openalex.org/W2009760216","https://openalex.org/W2028070713","https://openalex.org/W2028437524","https://openalex.org/W2055631528","https://openalex.org/W2066877749","https://openalex.org/W2072955302","https://openalex.org/W2078559757","https://openalex.org/W2090727353","https://openalex.org/W2097977809","https://openalex.org/W2099940443","https://openalex.org/W2102065031","https://openalex.org/W2134807967","https://openalex.org/W2311194142","https://openalex.org/W2496778042","https://openalex.org/W2516066574","https://openalex.org/W2553769569","https://openalex.org/W2751399725","https://openalex.org/W2765449478","https://openalex.org/W2793412195","https://openalex.org/W2807786182","https://openalex.org/W2887616981","https://openalex.org/W2904246096","https://openalex.org/W2926701059","https://openalex.org/W2946127746","https://openalex.org/W2973862992","https://openalex.org/W3037958117","https://openalex.org/W3118220620","https://openalex.org/W3123212791","https://openalex.org/W3153708329","https://openalex.org/W3180062783","https://openalex.org/W3184395191","https://openalex.org/W3205483739","https://openalex.org/W4210743106","https://openalex.org/W4285055378","https://openalex.org/W4292823135","https://openalex.org/W4306650020","https://openalex.org/W4313256120","https://openalex.org/W4313654696","https://openalex.org/W4319066581","https://openalex.org/W4381249713","https://openalex.org/W4385652604","https://openalex.org/W4386760178","https://openalex.org/W4386850692","https://openalex.org/W4388752503","https://openalex.org/W4390102210","https://openalex.org/W4390277654","https://openalex.org/W4391589697","https://openalex.org/W4392269288","https://openalex.org/W4393931133","https://openalex.org/W6674590887","https://openalex.org/W6698032686","https://openalex.org/W6966718204"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2906422846","https://openalex.org/W2390009783","https://openalex.org/W2053286651","https://openalex.org/W4254602698","https://openalex.org/W2133389611"],"abstract_inverted_index":{"Background":[0],"Network":[1],"intrusion":[2,22,79,136,221,231,259],"detection":[3,23,69,80,161,222,232,260],"is":[4,102],"a":[5,47,113,146,251],"critical":[6],"component":[7],"of":[8,184,194,200,248],"maintaining":[9],"network":[10,258],"security,":[11],"especially":[12],"as":[13,250],"cyber":[14,269],"threats":[15],"become":[16],"increasingly":[17],"sophisticated.":[18],"While":[19],"deep":[20],"learning-based":[21],"algorithms":[24],"have":[25],"shown":[26],"promise,":[27],"they":[28],"often":[29],"struggle":[30],"with":[31,58,107],"high-dimensional":[32,237],"datasets":[33,179,238],"containing":[34],"outliers,":[35],"anomalies,":[36],"or":[37],"rare":[38],"events.":[39],"This":[40,101],"study":[41],"addresses":[42],"these":[43],"challenges":[44],"by":[45,234],"proposing":[46],"novel":[48],"approach":[49],"that":[50,189],"combines":[51],"the":[52,59,77,98,118,126,131,153,157,175,182,203,207,246],"Improved":[53],"Gravitational":[54,86],"Search":[55,87,110],"Algorithm":[56,88],"(IGSA)":[57,89],"Soft":[60],"Actor-Critic":[61],"(SAC)":[62],"reinforcement":[63,147],"learning":[64,148,154],"algorithm,":[65],"aiming":[66],"to":[67,90,116,129,151,159,180],"enhance":[68],"accuracy":[70,193,215,264],"and":[71,95,112,140,167,177,196,216,239,253,265],"computational":[72,141,241],"efficiency.":[73],"Methods":[74],"We":[75],"introduce":[76],"IGSA-SAC":[78,122,190,210,227,249],"model,":[81],"which":[82],"leverages":[83],"an":[84,108,192,197],"enhanced":[85,263],"improve":[91,160],"robustness":[92],"against":[93],"outliers":[94],"dynamically":[96],"adjust":[97],"exploration-exploitation":[99],"balance.":[100],"achieved":[103],"through":[104],"fitness":[105],"normalization":[106],"Adaptive":[109],"Radius":[111],"sigmoid":[114],"function":[115,150],"modulate":[117],"gravitational":[119],"constant.":[120],"The":[121,186,225,243],"method":[123,228],"effectively":[124,235],"navigates":[125],"search":[127],"space":[128],"identify":[130],"most":[132],"relevant":[133],"features":[134],"for":[135,256],"detection,":[137],"reducing":[138,240],"dimensionality":[139],"complexity.":[142,242],"Additionally,":[143],"we":[144],"design":[145],"reward":[149],"guide":[152],"process,":[155],"encouraging":[156],"agent":[158],"effectiveness":[162],"while":[163],"minimizing":[164],"false":[165],"alarms":[166],"missed":[168],"detections.":[169],"Results":[170],"Experiments":[171],"were":[172],"conducted":[173],"on":[174,202],"NSL-KDD":[176,204],"AWID":[178,208],"evaluate":[181],"performance":[183,233],"IGSA-SAC.":[185],"results":[187,244],"demonstrate":[188],"achieves":[191],"84.15%":[195],"F":[198,217],"1-score":[199],"84.85%":[201],"dataset.":[205],"On":[206],"dataset,":[209],"surpasses":[211],"98.9%":[212],"in":[213,267],"both":[214],"1-score,":[218],"outperforming":[219],"existing":[220],"algorithms.":[223],"Conclusions":[224],"proposed":[226],"significantly":[229],"improves":[230],"handling":[236],"highlight":[245],"potential":[247],"robust":[252],"efficient":[254],"solution":[255],"real-world":[257],"systems,":[261],"offering":[262],"reliability":[266],"identifying":[268],"threats.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
