{"id":"https://openalex.org/W7117115013","doi":"https://doi.org/10.48550/arxiv.2512.19037","title":"Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms","display_name":"Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms","publication_year":2025,"publication_date":"2025-12-22","ids":{"openalex":"https://openalex.org/W7117115013","doi":"https://doi.org/10.48550/arxiv.2512.19037"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.19037","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.19037","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.19037","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119895808","display_name":"Md Minhazul Islam Munna","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Munna, Md Minhazul Islam","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121167304","display_name":"Md Mahbubur Rahman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahman, Md Mahbubur","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041673632","display_name":"Jaroslav Frnda","orcid":"https://orcid.org/0000-0001-6065-3087"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Frnda, Jaroslav","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014296507","display_name":"Muhammad Shahid Anwar","orcid":"https://orcid.org/0000-0001-8093-6690"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anwar, Muhammad Shahid","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5076361725","display_name":"Alpamis Kutlimuratov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kutlimuratov, Alpamis","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5119895808"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.42340001463890076,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.42340001463890076,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.07349999994039536,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.06530000269412994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5346999764442444},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5302000045776367},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4821000099182129},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.47690001130104065},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.40400001406669617},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.3917999863624573},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3905999958515167},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.3824000060558319},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.37689998745918274},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.37049999833106995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7763000130653381},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7493000030517578},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7081000208854675},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5346999764442444},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5302000045776367},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4821000099182129},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.47690001130104065},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.40400001406669617},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.3917999863624573},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3905999958515167},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3889999985694885},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.3824000060558319},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.37689998745918274},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.37049999833106995},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3612000048160553},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3465000092983246},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.3425999879837036},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.34119999408721924},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3361000120639801},{"id":"https://openalex.org/C2778827112","wikidata":"https://www.wikidata.org/wiki/Q22245680","display_name":"Feature engineering","level":3,"score":0.32839998602867126},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3100000023841858},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C186108316","wikidata":"https://www.wikidata.org/wiki/Q352530","display_name":"Adaptive neuro fuzzy inference system","level":4,"score":0.29350000619888306},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.2816999852657318},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25929999351501465},{"id":"https://openalex.org/C60908668","wikidata":"https://www.wikidata.org/wiki/Q690207","display_name":"Perceptron","level":3,"score":0.2590000033378601}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.19037","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.19037","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.19037","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.19037","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,74],"proliferation":[1],"of":[2,139,142,145,152,164],"IoT":[3,186],"devices":[4],"and":[5,19,30,47,87,101,113,119,147,182,193],"their":[6,53],"reliance":[7],"on":[8,124],"Wi-Fi":[9,177],"networks":[10],"have":[11],"introduced":[12],"significant":[13],"security":[14,174],"vulnerabilities,":[15],"particularly":[16],"the":[17,125,129,162,200],"KRACK":[18],"Kr00k":[20],"attacks,":[21,178],"which":[22],"exploit":[23],"weaknesses":[24],"in":[25,55],"WPA2":[26],"encryption":[27],"to":[28,81,116,171,197],"intercept":[29],"manipulate":[31],"sensitive":[32],"data.":[33],"Traditional":[34],"IDS":[35],"using":[36],"classifiers":[37],"face":[38],"challenges":[39],"such":[40],"as":[41],"model":[42,105],"overfitting,":[43],"incomplete":[44],"feature":[45,78],"extraction,":[46],"high":[48],"false":[49,121,149],"positive":[50,150],"rates,":[51],"limiting":[52],"effectiveness":[54],"real-world":[56],"deployments.":[57],"To":[58],"address":[59],"these":[60],"challenges,":[61],"this":[62],"study":[63],"proposes":[64],"a":[65,97,102,148,180],"robust":[66],"multiclass":[67],"machine":[68],"learning":[69,115,170],"based":[70],"intrusion":[71],"detection":[72,89],"framework.":[73],"methodology":[75],"integrates":[76],"advanced":[77],"selection":[79],"techniques":[80],"identify":[82],"critical":[83],"attributes,":[84],"mitigating":[85],"redundancy":[86],"enhancing":[88],"accuracy.":[90],"Two":[91],"distinct":[92],"ML":[93],"architectures":[94],"are":[95],"implemented:":[96],"baseline":[98],"classifier":[99],"pipeline":[100],"stacked":[103],"ensemble":[104,131,169],"combining":[106,165],"noise":[107],"injection,":[108],"Principal":[109],"Component":[110],"Analysis":[111],"(PCA),":[112],"meta":[114],"improve":[117],"generalization":[118],"reduce":[120],"positives.":[122],"Evaluated":[123],"AWID3":[126],"data":[127],"set,":[128],"proposed":[130],"architecture":[132],"achieves":[133],"superior":[134],"performance,":[135],"with":[136,168],"an":[137],"accuracy":[138],"98%,":[140,143,146],"precision":[141],"recall":[144],"rate":[151],"just":[153],"2%,":[154],"outperforming":[155],"existing":[156],"state-of-the-art":[157],"methods.":[158],"This":[159],"work":[160],"demonstrates":[161],"efficacy":[163],"preprocessing":[166],"strategies":[167],"fortify":[172],"network":[173],"against":[175],"sophisticated":[176],"offering":[179],"scalable":[181],"reliable":[183],"solution":[184],"for":[185],"environments.":[187],"Future":[188],"directions":[189],"include":[190],"real-time":[191],"deployment":[192],"adversarial":[194],"resilience":[195],"testing":[196],"further":[198],"enhance":[199],"model's":[201],"adaptability.":[202]},"counts_by_year":[],"updated_date":"2025-12-24T23:14:05.333182","created_date":"2025-12-24T00:00:00"}
