{"id":"https://openalex.org/W4405851597","doi":"https://doi.org/10.3390/computers14010004","title":"WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches","display_name":"WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches","publication_year":2024,"publication_date":"2024-12-27","ids":{"openalex":"https://openalex.org/W4405851597","doi":"https://doi.org/10.3390/computers14010004"},"language":"en","primary_location":{"id":"doi:10.3390/computers14010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14010004","pdf_url":"https://www.mdpi.com/2073-431X/14/1/4/pdf?version=1735280400","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/14/1/4/pdf?version=1735280400","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032218510","display_name":"Shehla Gul","orcid":"https://orcid.org/0009-0007-1648-8185"},"institutions":[{"id":"https://openalex.org/I173207729","display_name":"University of Engineering and Technology Taxila","ror":"https://ror.org/03v00ka07","country_code":"PK","type":"education","lineage":["https://openalex.org/I173207729"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Shehla Gul","raw_affiliation_strings":["Department of Computer Engineering, University of Engineering and Technology, Taxila 47080, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Engineering and Technology, Taxila 47080, Pakistan","institution_ids":["https://openalex.org/I173207729"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022654942","display_name":"Sobia Arshad","orcid":"https://orcid.org/0000-0002-9962-3536"},"institutions":[{"id":"https://openalex.org/I29698356","display_name":"HITEC University","ror":"https://ror.org/013d87239","country_code":"PK","type":"education","lineage":["https://openalex.org/I29698356"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sobia Arshad","raw_affiliation_strings":["Department of Computer Engineering, HITEC University, Taxila 47080, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, HITEC University, Taxila 47080, Pakistan","institution_ids":["https://openalex.org/I29698356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016198678","display_name":"Sanay Muhammad Umar Saeed","orcid":null},"institutions":[{"id":"https://openalex.org/I173207729","display_name":"University of Engineering and Technology Taxila","ror":"https://ror.org/03v00ka07","country_code":"PK","type":"education","lineage":["https://openalex.org/I173207729"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sanay Muhammad Umar Saeed","raw_affiliation_strings":["Department of Computer Engineering, University of Engineering and Technology, Taxila 47080, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, University of Engineering and Technology, Taxila 47080, Pakistan","institution_ids":["https://openalex.org/I173207729"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071229536","display_name":"Adeel Akram","orcid":"https://orcid.org/0000-0003-0260-0088"},"institutions":[{"id":"https://openalex.org/I173207729","display_name":"University of Engineering and Technology Taxila","ror":"https://ror.org/03v00ka07","country_code":"PK","type":"education","lineage":["https://openalex.org/I173207729"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Adeel Akram","raw_affiliation_strings":["Department of Telecommunication Engineering, University of Engineering and Technology, Taxila 47080, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Telecommunication Engineering, University of Engineering and Technology, Taxila 47080, Pakistan","institution_ids":["https://openalex.org/I173207729"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050679807","display_name":"Muhammad Awais Azam","orcid":"https://orcid.org/0000-0003-0488-4598"},"institutions":[{"id":"https://openalex.org/I4210120792","display_name":"Whitecliffe College of Arts and Design","ror":"https://ror.org/02d6ntk65","country_code":"NZ","type":"education","lineage":["https://openalex.org/I4210120792"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Muhammad Awais Azam","raw_affiliation_strings":["Technology Innovation Research Group, School of Information Technology, Whitecliffe, Wellington 6145, New Zealand"],"affiliations":[{"raw_affiliation_string":"Technology Innovation Research Group, School of Information Technology, Whitecliffe, Wellington 6145, New Zealand","institution_ids":["https://openalex.org/I4210120792"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050679807"],"corresponding_institution_ids":["https://openalex.org/I4210120792"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":3.8149,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94179079,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"14","issue":"1","first_page":"4","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8129520416259766},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6773256063461304},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.646344006061554},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.6307724118232727},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.617368221282959},{"id":"https://openalex.org/keywords/oversampling","display_name":"Oversampling","score":0.5980270504951477},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.5467837452888489},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5025448799133301},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.48438769578933716},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.45720937848091125},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42814701795578003},{"id":"https://openalex.org/keywords/perceptron","display_name":"Perceptron","score":0.4261783957481384},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3349611163139343},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.24521702527999878}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8129520416259766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6773256063461304},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.646344006061554},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.6307724118232727},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.617368221282959},{"id":"https://openalex.org/C197323446","wikidata":"https://www.wikidata.org/wiki/Q331222","display_name":"Oversampling","level":3,"score":0.5980270504951477},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.5467837452888489},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5025448799133301},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.48438769578933716},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.45720937848091125},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42814701795578003},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.4261783957481384},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3349611163139343},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.24521702527999878},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers14010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14010004","pdf_url":"https://www.mdpi.com/2073-431X/14/1/4/pdf?version=1735280400","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:35e396426ea04552a7ac4c897467cedc","is_oa":true,"landing_page_url":"https://doaj.org/article/35e396426ea04552a7ac4c897467cedc","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 14, Iss 1, p 4 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers14010004","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers14010004","pdf_url":"https://www.mdpi.com/2073-431X/14/1/4/pdf?version=1735280400","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Life in Land","score":0.5400000214576721,"id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320316680","display_name":"University of Engineering and Technology, Lahore","ror":"https://ror.org/0051w2v06"},{"id":"https://openalex.org/F4320325822","display_name":"University of Engineering and Technology, Taxila","ror":"https://ror.org/03v00ka07"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405851597.pdf"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W2789828921","https://openalex.org/W2921364842","https://openalex.org/W2944643572","https://openalex.org/W3009253820","https://openalex.org/W3019959491","https://openalex.org/W3087470167","https://openalex.org/W3093410479","https://openalex.org/W3093778635","https://openalex.org/W3111758288","https://openalex.org/W3114501338","https://openalex.org/W3135344151","https://openalex.org/W3168793901","https://openalex.org/W3173285125","https://openalex.org/W3198200730","https://openalex.org/W3205323312","https://openalex.org/W4206130810","https://openalex.org/W4210584156","https://openalex.org/W4210659135","https://openalex.org/W4220658398","https://openalex.org/W4281938827","https://openalex.org/W4282042832","https://openalex.org/W4289130121","https://openalex.org/W4300167448","https://openalex.org/W4307874718","https://openalex.org/W4309581904","https://openalex.org/W4312204616","https://openalex.org/W4313586675","https://openalex.org/W4313891707","https://openalex.org/W4319264752","https://openalex.org/W4319439792","https://openalex.org/W4321016094","https://openalex.org/W4323782505","https://openalex.org/W4353090637","https://openalex.org/W4361292119","https://openalex.org/W4380372584","https://openalex.org/W4381249713","https://openalex.org/W4385199355","https://openalex.org/W4385557349","https://openalex.org/W4386601358","https://openalex.org/W4387262182","https://openalex.org/W4387704148","https://openalex.org/W4390277654","https://openalex.org/W4391258395","https://openalex.org/W4391707528","https://openalex.org/W4391755100","https://openalex.org/W4394627330","https://openalex.org/W4396698840","https://openalex.org/W4399144478","https://openalex.org/W4399526966","https://openalex.org/W4402159848","https://openalex.org/W4402517178","https://openalex.org/W4403511508","https://openalex.org/W6676013096","https://openalex.org/W6748503732","https://openalex.org/W6846651298","https://openalex.org/W6872224922"],"related_works":["https://openalex.org/W2766503024","https://openalex.org/W2781247653","https://openalex.org/W4206637278","https://openalex.org/W4386005305","https://openalex.org/W4386214543","https://openalex.org/W4401045170","https://openalex.org/W3172259201","https://openalex.org/W2903618681","https://openalex.org/W3184937791","https://openalex.org/W4401052546"],"abstract_inverted_index":{"The":[0],"rise":[1],"in":[2,16,49,116],"cyber":[3,36],"security":[4],"issues":[5],"has":[6],"caused":[7],"significant":[8],"harm":[9],"to":[10,59,68,94,135,152,163,190],"tech":[11],"world":[12],"and":[13,28,39,51,73,86,113,121,143,185,196],"thus":[14],"society":[15],"recent":[17],"years.":[18],"Intrusion":[19],"detection":[20,27,219],"systems":[21],"(IDSs)":[22],"are":[23,42,63],"crucial":[24],"for":[25,46,105],"the":[26,29,32,69,74,81,108,137,146,161,165,192,202],"mitigation":[30],"of":[31,35,77,83,110,156,167],"increasing":[33],"risk":[34],"attacks.":[37,193],"False":[38],"disregarded":[40],"alarms":[41],"a":[43,103,154,168],"common":[44],"problem":[45],"traditional":[47],"IDSs":[48],"high-bandwidth":[50],"large-scale":[52],"network":[53],"systems.":[54],"While":[55],"applying":[56],"learning":[57,176],"techniques":[58],"intrusion":[60],"detection,":[61],"researchers":[62],"facing":[64],"challenges":[65],"mainly":[66],"due":[67],"imbalanced":[70,111,141],"training":[71,88,169],"sets":[72],"high":[75,114],"dimensionality":[76,115,166],"datasets,":[78,142],"resulting":[79],"from":[80],"scarcity":[82],"attack":[84],"data":[85],"longer":[87],"periods,":[89],"respectively.":[90],"Thus,":[91],"this":[92,98,198],"leads":[93],"reduced":[95],"efficiency.":[96],"In":[97,118],"research":[99],"study,":[100],"we":[101,124,144,172],"propose":[102],"strategy":[104,128],"dealing":[106],"with":[107],"problems":[109],"datasets":[112],"IDSs.":[117],"our":[119,209],"efficient":[120],"novel":[122],"framework,":[123],"integrate":[125],"an":[126],"oversampling":[127],"that":[129,158,208],"uses":[130],"Generative":[131],"Adversarial":[132],"Networks":[133],"(GANs)":[134],"overcome":[136],"difficulties":[138],"introduced":[139],"by":[140,221],"use":[145,173],"Random":[147],"Forest":[148],"(RF)":[149],"importance":[150],"algorithm":[151],"select":[153],"subset":[155],"features":[157],"best":[159],"represent":[160],"dataset":[162],"reduce":[164],"dataset.":[170,204],"Then,":[171],"three":[174],"deep":[175],"techniques,":[177],"Multi-Layer":[178],"Perceptron":[179],"(MLP),":[180],"Convolutional":[181],"Neural":[182],"Network":[183],"(CNN),":[184],"Long":[186],"Short-Term":[187],"Memory":[188],"(LSTM),":[189],"classify":[191],"We":[194],"implement":[195],"evaluate":[197],"proposed":[199,210],"framework":[200,211],"on":[201],"CICIDS2017":[203],"Experimental":[205],"results":[206],"show":[207],"outperforms":[212],"state-of-the-art":[213],"approaches,":[214],"vastly":[215],"improving":[216],"DL":[217],"model":[218],"accuracy":[220],"98%":[222],"using":[223],"CNN.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":8}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
