{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:29:49Z","timestamp":1763810989200,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568660","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"208-215","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Leveraging AI-Driven Realtime Intrusion Detection by Using WGAN and XGBoost"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9862-0088","authenticated-orcid":false,"given":"Hoang","family":"V.Vo","sequence":"first","affiliation":[{"name":"VNU University of Engineering and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1000-2128","authenticated-orcid":false,"given":"Duong H.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"VNU University of Engineering and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1732-4928","authenticated-orcid":false,"given":"Tuyen T.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"VNU University of Engineering and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2565-281X","authenticated-orcid":false,"given":"Hoa N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"VNU University of Engineering and Technology, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8114-6735","authenticated-orcid":false,"given":"Duan V.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2018.2879990"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700332"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554710"},{"key":"#cr-split#-e_1_3_2_1_5_1.1","unstructured":"Martin Arjovsky Soumith Chintala and L\u00e9on Bottou. 2017. Wasserstein GAN. https:\/\/doi.org\/10.48550\/ARXIV.1701.07875 10.48550\/ARXIV.1701.07875"},{"key":"#cr-split#-e_1_3_2_1_5_1.2","unstructured":"Martin Arjovsky Soumith Chintala and L\u00e9on Bottou. 2017. Wasserstein GAN. https:\/\/doi.org\/10.48550\/ARXIV.1701.07875"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089586"},{"volume-title":"Web, Artificial Intelligence and Network Applications, WAINA2020(Advances in Intelligent Systems and Computing)","author":"Catillo Marta","key":"e_1_3_2_1_7_1","unstructured":"Marta Catillo , Massimiliano Rak , and Villano Umberto . 2020. 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes . In Web, Artificial Intelligence and Network Applications, WAINA2020(Advances in Intelligent Systems and Computing) . Springer International Publishing , 687\u2013696. https:\/\/doi.org\/10.1007\/978-3-030-44038-1_63 10.1007\/978-3-030-44038-1_63 Marta Catillo, Massimiliano Rak, and Villano Umberto. 2020. 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. In Web, Artificial Intelligence and Network Applications, WAINA2020(Advances in Intelligent Systems and Computing). Springer International Publishing, 687\u2013696. https:\/\/doi.org\/10.1007\/978-3-030-44038-1_63"},{"key":"e_1_3_2_1_8_1","volume-title":"An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Computing and Applications 32 (08","author":"Devan Preethi","year":"2020","unstructured":"Preethi Devan and Neelu Khare . 2020. An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Computing and Applications 32 (08 2020 ). https:\/\/doi.org\/10.1007\/s00521-020-04708-x 10.1007\/s00521-020-04708-x Preethi Devan and Neelu Khare. 2020. An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Computing and Applications 32 (08 2020). https:\/\/doi.org\/10.1007\/s00521-020-04708-x"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701270"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120898"},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/github.com\/ISCX\/CICFlowMeter. (08","author":"Habibi\u00a0Lashkari Arash","year":"2018","unstructured":"Arash Habibi\u00a0Lashkari . 2018. CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyser for anomaly detection. https:\/\/github.com\/ISCX\/CICFlowMeter. (08 2018 ). https:\/\/doi.org\/10.13140\/RG.2.2.13827.20003 10.13140\/RG.2.2.13827.20003 Arash Habibi\u00a0Lashkari. 2018. CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyser for anomaly detection. https:\/\/github.com\/ISCX\/CICFlowMeter. (08 2018). https:\/\/doi.org\/10.13140\/RG.2.2.13827.20003"},{"key":"e_1_3_2_1_12_1","volume-title":"Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models. Cybernetics and Information Technologies 21 (09","author":"Ikram Sumaiya","year":"2021","unstructured":"Sumaiya Ikram , Aswani\u00a0Kumar Cherukuri , Babu Poorva , Pamidi Ushasree , Yishuo Zhang , Xiao Liu , and Gang Li. 2021. Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models. Cybernetics and Information Technologies 21 (09 2021 ), 175\u2013188. https:\/\/doi.org\/10.2478\/cait-2021-0037 10.2478\/cait-2021-0037 Sumaiya Ikram, Aswani\u00a0Kumar Cherukuri, Babu Poorva, Pamidi Ushasree, Yishuo Zhang, Xiao Liu, and Gang Li. 2021. Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models. Cybernetics and Information Technologies 21 (09 2021), 175\u2013188. https:\/\/doi.org\/10.2478\/cait-2021-0037"},{"key":"#cr-split#-e_1_3_2_1_13_1.1","doi-asserted-by":"crossref","unstructured":"Piyasak Jeatrakul Kok Wong and Chun Fung. 2010. Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm. 152-159. https:\/\/doi.org\/10.1007\/978-3-642-17534-3_19 10.1007\/978-3-642-17534-3_19","DOI":"10.1007\/978-3-642-17534-3_19"},{"key":"#cr-split#-e_1_3_2_1_13_1.2","doi-asserted-by":"crossref","unstructured":"Piyasak Jeatrakul Kok Wong and Chun Fung. 2010. Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm. 152-159. https:\/\/doi.org\/10.1007\/978-3-642-17534-3_19","DOI":"10.1007\/978-3-642-17534-3_19"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2018.2793284"},{"key":"#cr-split#-e_1_3_2_1_15_1.1","doi-asserted-by":"crossref","unstructured":"Ilyas\u00a0Adeleke Jimoh Idris Ismaila and Morufu Olalere. 2019. Enhanced Decision Tree-J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset. In 2019 15th International Conference on Electronics Computer and Computation (ICECCO). 1-8. https:\/\/doi.org\/10.1109\/ICECCO48375.2019.9043233 10.1109\/ICECCO48375.2019.9043233","DOI":"10.1109\/ICECCO48375.2019.9043233"},{"key":"#cr-split#-e_1_3_2_1_15_1.2","doi-asserted-by":"crossref","unstructured":"Ilyas\u00a0Adeleke Jimoh Idris Ismaila and Morufu Olalere. 2019. Enhanced Decision Tree-J48 With SMOTE Machine Learning Algorithm for Effective Botnet Detection in Imbalance Dataset. In 2019 15th International Conference on Electronics Computer and Computation (ICECCO). 1-8. https:\/\/doi.org\/10.1109\/ICECCO48375.2019.9043233","DOI":"10.1109\/ICECCO48375.2019.9043233"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973219"},{"key":"e_1_3_2_1_17_1","volume-title":"Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 1 (17","author":"Khraisat Ansam","year":"2019","unstructured":"Ansam Khraisat , Iqbal Gondal , Peter Vamplew , and Joarder Kamruzzaman . 2019. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 1 (17 Jul 2019 ), 20. https:\/\/doi.org\/10.1186\/s42400-019-0038-7 10.1186\/s42400-019-0038-7 Ansam Khraisat, Iqbal Gondal, Peter Vamplew, and Joarder Kamruzzaman. 2019. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2, 1 (17 Jul 2019), 20. https:\/\/doi.org\/10.1186\/s42400-019-0038-7"},{"key":"e_1_3_2_1_18_1","first-page":"184","article-title":"GuruWS: A Hybrid Platform for Detecting Malicious Web Shells and Web Application Vulnerabilities","volume":"11370","author":"Le V.","year":"2019","unstructured":"Giap\u00a0 V. Le , Tung\u00a0 H. Nguyen , Phuc\u00a0 D. Pham , On\u00a0 V. Phung , and Hoa\u00a0 N. Nguyen . 2019 . GuruWS: A Hybrid Platform for Detecting Malicious Web Shells and Web Application Vulnerabilities . Transactions on Computational Collective Intelligence 11370 (2019), 184 \u2013 208 . https:\/\/doi.org\/10.1007\/978-3-662-58611-2_5 10.1007\/978-3-662-58611-2_5 Giap\u00a0V. Le, Tung\u00a0H. Nguyen, Phuc\u00a0D. Pham, On\u00a0V. Phung, and Hoa\u00a0N. Nguyen. 2019. GuruWS: A Hybrid Platform for Detecting Malicious Web Shells and Web Application Vulnerabilities. Transactions on Computational Collective Intelligence 11370 (2019), 184\u2013208. https:\/\/doi.org\/10.1007\/978-3-662-58611-2_5","journal-title":"Transactions on Computational Collective Intelligence"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/ijwgs.2022.126117"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3122979"},{"volume-title":"Computational Collective Intelligence","author":"Le V.","key":"e_1_3_2_1_21_1","unstructured":"Ha\u00a0 V. Le , Hoang\u00a0 V. Vo , Tu\u00a0 N. Nguyen , Hoa\u00a0 N. Nguyen , and Hung\u00a0 T. Du. 2022. Towards a\u00a0Webshell Detection Approach Using Rule-Based and\u00a0Deep HTTP Traffic Analysis . In Computational Collective Intelligence . Springer International Publishing , Cham , 571\u2013584. https:\/\/doi.org\/10.1007\/978-3-031-16014-1_45 10.1007\/978-3-031-16014-1_45 Ha\u00a0V. Le, Hoang\u00a0V. Vo, Tu\u00a0N. Nguyen, Hoa\u00a0N. Nguyen, and Hung\u00a0T. Du. 2022. Towards a\u00a0Webshell Detection Approach Using Rule-Based and\u00a0Deep HTTP Traffic Analysis. In Computational Collective Intelligence. Springer International Publishing, Cham, 571\u2013584. https:\/\/doi.org\/10.1007\/978-3-031-16014-1_45"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048198"},{"key":"e_1_3_2_1_23_1","volume-title":"Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches. Applied Sciences 10 (03","author":"Mag\u00e1n-Carri\u00f3n Roberto","year":"2020","unstructured":"Roberto Mag\u00e1n-Carri\u00f3n , Daniel Urda , Ignacio Diaz-Cano , and Bernabe Dorronsoro . 2020. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches. Applied Sciences 10 (03 2020 ), 1775. https:\/\/doi.org\/10.3390\/app10051775 10.3390\/app10051775 Roberto Mag\u00e1n-Carri\u00f3n, Daniel Urda, Ignacio Diaz-Cano, and Bernabe Dorronsoro. 2020. Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches. Applied Sciences 10 (03 2020), 1775. https:\/\/doi.org\/10.3390\/app10051775"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WorldS450073.2020.9210368"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOINS.2016.7783243"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2982936"},{"key":"e_1_3_2_1_27_1","volume-title":"2020. A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. Security and Communication Networks (01","author":"Rajagopal Smitha","year":"2020","unstructured":"Smitha Rajagopal , Poornima Kundapur , and Hareesha S . 2020. A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. Security and Communication Networks (01 2020 ), 1\u20139. https:\/\/doi.org\/10.1155\/2020\/4586875 10.1155\/2020 Smitha Rajagopal, Poornima Kundapur, and Hareesha S.2020. A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets. Security and Communication Networks (01 2020), 1\u20139. https:\/\/doi.org\/10.1155\/2020\/4586875"},{"key":"e_1_3_2_1_28_1","volume-title":"Network Intrusion Detection Using Clustering and Gradient Boosting. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 1\u20137. https:\/\/doi.org\/10","author":"Verma Parag","year":"2018","unstructured":"Parag Verma , Shayan Anwar , Shadab Khan , and Sunil\u00a0 B Mane . 2018 . Network Intrusion Detection Using Clustering and Gradient Boosting. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 1\u20137. https:\/\/doi.org\/10 .1109\/ICCCNT.2018.8494186 10.1109\/ICCCNT.2018.8494186 Parag Verma, Shayan Anwar, Shadab Khan, and Sunil\u00a0B Mane. 2018. Network Intrusion Detection Using Clustering and Gradient Boosting. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 1\u20137. https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494186"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"e_1_3_2_1_30_1","volume-title":"The 2022 IEEE Global Communications Conference (GLOBECOM) (in press). 1\u20136.","author":"Vo V.","year":"2022","unstructured":"Hoang\u00a0 V. Vo , Hoa\u00a0 N. Nguyen , Tu\u00a0 N. Nguyen , and Hanh\u00a0 P. Du . 2022 . SDAID: Towards a Hybrid Signature and Deep Analysis-based Intrusion Detection Method . In The 2022 IEEE Global Communications Conference (GLOBECOM) (in press). 1\u20136. Hoang\u00a0V. Vo, Hoa\u00a0N. Nguyen, Tu\u00a0N. Nguyen, and Hanh\u00a0P. Du. 2022. SDAID: Towards a Hybrid Signature and Deep Analysis-based Intrusion Detection Method. In The 2022 IEEE Global Communications Conference (GLOBECOM) (in press). 1\u20136."},{"key":"e_1_3_2_1_31_1","volume-title":"Tackling Class Imbalance in Cyber Security Datasets. In IEEE International Conference on Information Reuse and Integration. 229\u2013232","author":"Wheelus Charles","year":"2018","unstructured":"Charles Wheelus , Elias Bou-Harb ., and Xingquan Zhu . 2018 . Tackling Class Imbalance in Cyber Security Datasets. In IEEE International Conference on Information Reuse and Integration. 229\u2013232 . https:\/\/doi.org\/10.1109\/IRI.2018.00041 10.1109\/IRI.2018.00041 Charles Wheelus, Elias Bou-Harb., and Xingquan Zhu. 2018. Tackling Class Imbalance in Cyber Security Datasets. In IEEE International Conference on Information Reuse and Integration. 229\u2013232. https:\/\/doi.org\/10.1109\/IRI.2018.00041"},{"key":"e_1_3_2_1_32_1","volume-title":"A semi-self-taught network intrusion detection system. Neural Computing and Applications 32 (12","author":"Zhao Feng","year":"2020","unstructured":"Feng Zhao , Hao Zhang , Jia Peng , Xiaohong Zhuang , and Sang-Gyun Na. 2020. A semi-self-taught network intrusion detection system. Neural Computing and Applications 32 (12 2020 ). https:\/\/doi.org\/10.1007\/s00521-020-04914-7 10.1007\/s00521-020-04914-7 Feng Zhao, Hao Zhang, Jia Peng, Xiaohong Zhuang, and Sang-Gyun Na. 2020. A semi-self-taught network intrusion detection system. Neural Computing and Applications 32 (12 2020). https:\/\/doi.org\/10.1007\/s00521-020-04914-7"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","acronym":"SoICT 2022","location":"Hanoi Vietnam"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":35,"alternative-id":["10.1145\/3568562.3568660","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568660","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}