{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:19:48Z","timestamp":1770524388334,"version":"3.49.0"},"reference-count":25,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>A network intrusion detection method that integrates improved spatiotemporal residual network and generative adversarial network (GAN) in a big data environment is proposed to address the issues of poor feature extraction and significant impact from data imbalance in most existing intrusion detection methods. First, GANs are used for wireless sensor network data resampling to generate new sample sets, thereby overcoming the impact of data imbalance. Then, an improved spatiotemporal residual network model is designed, in which the spatial and temporal features of the data are extracted and fused through multi-scale one-dimensional convolution modules and gated loop unit modules, and identity maps are added based on the idea of residual networks to avoid network degradation and other issues. Finally, the resampled samples are input into the improved spatiotemporal residual network model to output the intrusion detection results of the network. Based on the NSL-KDD, UNSW-NB15, and CICIDS2017 datasets, experimental analysis is conducted on the proposed method. The results showed that its accuracy on the three datasets is 99.62, 83.98, and 99.86%, respectively, which are superior to other comparative methods.<\/jats:p>","DOI":"10.1515\/comp-2024-0018","type":"journal-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T18:54:03Z","timestamp":1733943243000},"source":"Crossref","is-referenced-by-count":4,"title":["WSN intrusion detection method using improved spatiotemporal ResNet and GAN"],"prefix":"10.1515","volume":"14","author":[{"given":"Jing","family":"Yang","sequence":"first","affiliation":[{"name":"School of Mathematics and Computer Science, Hanjiang Normal University , Shiyan , 442000, Hubei , P. R. China"}]}],"member":"374","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"2024121113522606348_j_comp-2024-0018_ref_001","doi-asserted-by":"crossref","unstructured":"Z. T. Chen, X. D. Yang, B. Jin, M. Y. Guo, and M. M. Li, \u201cIndustrial internet security evaluation technology based on digital twin,\u201d J. Comput. Methods Sci. Eng., vol. 22, no. 6, pp. 1981\u20131994, 2022.","DOI":"10.3233\/JCM-226375"},{"key":"2024121113522606348_j_comp-2024-0018_ref_002","doi-asserted-by":"crossref","unstructured":"B. Xu, \u201cDesign of intrusion detection system for intelligent mobile network teaching,\u201d Comput. Electr. Eng., vol. 112, p. 109013, 2023.","DOI":"10.1016\/j.compeleceng.2023.109013"},{"key":"2024121113522606348_j_comp-2024-0018_ref_003","doi-asserted-by":"crossref","unstructured":"S. F. Li, C. Yue, S. H. Liu, Y. P. Lai, Y. D. Zhu, and A. Naveed, \u201cHDA-IDS: A hybrid DoS attacks intrusion detection system for IoT by using semi-supervised CL-GAN,\u201d Expert. Syst. Appl., vol. 238, p. 122198, 2024.","DOI":"10.1016\/j.eswa.2023.122198"},{"key":"2024121113522606348_j_comp-2024-0018_ref_004","doi-asserted-by":"crossref","unstructured":"L. J. Dong, J. Wang, J. C. Wang, and H. W. Wang, \u201cSafe and intelligent mining: Some explorations and challenges in the era of big data,\u201d J. Cent. South. Univ., vol. 30, no. 6, pp. 1900\u20131914, 2023.","DOI":"10.1007\/s11771-023-5350-4"},{"key":"2024121113522606348_j_comp-2024-0018_ref_005","doi-asserted-by":"crossref","unstructured":"L. L. Guo, L. M. Wang, X. M. Han, L. Yue, Y. H. Zhang, and M. H. Gao, \u201cROCM: A rolling iteration clustering model via extracting data features,\u201d Neural Process. Lett., vol. 55, no. 4, pp. 3899\u20133922, 2022.","DOI":"10.1007\/s11063-022-10972-w"},{"key":"2024121113522606348_j_comp-2024-0018_ref_006","doi-asserted-by":"crossref","unstructured":"G. Vembu and D. Ramasamy, \u201cOptimized deep learning\u2010based intrusion detection for wireless sensor networks,\u201d Int. J. Commun. Syst., vol. 36, no. 13, p. 1, 2022.","DOI":"10.1002\/dac.5254"},{"key":"2024121113522606348_j_comp-2024-0018_ref_007","doi-asserted-by":"crossref","unstructured":"G. Ali and F. S. Mostafa, \u201cA deep learning approach to network intrusion detection using a proposed supervised sparse auto-encoder and SVM,\u201d Iran. J. Sci. Technol. Trans. Electr. Eng., vol. 46, no. 3, pp. 829\u2013846, 2022.","DOI":"10.1007\/s40998-022-00498-1"},{"key":"2024121113522606348_j_comp-2024-0018_ref_008","doi-asserted-by":"crossref","unstructured":"R. Alkanhel, \u201cNetwork intrusion detection based on feature selection and hybrid metaheuristic optimization,\u201d Comput. Mater. Continua, vol. 74, no. 2, pp. 2677\u20132693, 2022.","DOI":"10.32604\/cmc.2023.033273"},{"key":"2024121113522606348_j_comp-2024-0018_ref_009","unstructured":"S. T. Salah, \u201cA real-time hardware intrusion detection system and a classifying features algorithm,\u201d J. Appl. Secur. Res., vol. 18, no. 4, pp. 845\u2013879, 2023."},{"key":"2024121113522606348_j_comp-2024-0018_ref_010","doi-asserted-by":"crossref","unstructured":"A. V. S. Babu, P. M. Devi, B. Sharmila, and D. Suganya, \u201cPerformance analysis on cluster-based intrusion detection techniques for energy efficient and secured data communication in MANET,\u201d Int. J. Inf. Syst. Change Manag., vol. 11, no. 1, pp. 56\u201369, 2019.","DOI":"10.1504\/IJISCM.2019.101649"},{"key":"2024121113522606348_j_comp-2024-0018_ref_011","unstructured":"Z. Jianwu, H. Jiasen, and Z. Di, \u201cIntrusion detection model based on fuzzy theory and association rules,\u201d Telecommun. Sci., vol. 41, no. 1, pp. 130\u2013139, 2019."},{"key":"2024121113522606348_j_comp-2024-0018_ref_012","doi-asserted-by":"crossref","unstructured":"Y. A. Sawafi, A. Touzene, and R. Hedjam, \u201cHybrid deep learning-based intrusion detection system for RPL IoT networks,\u201d J. Sens. Actuator Netw., vol. 12, no. 2, p. 21, 2023.","DOI":"10.3390\/jsan12020021"},{"key":"2024121113522606348_j_comp-2024-0018_ref_013","doi-asserted-by":"crossref","unstructured":"H. Y. Huang, L. Tao, D. Yong, B. B. Li, and A. Liu, \u201cAn artificial immunity based intrusion detection system for unknown cyberattacks,\u201d Appl. Soft Comput., vol. 148, p. 110875, 2023.","DOI":"10.1016\/j.asoc.2023.110875"},{"key":"2024121113522606348_j_comp-2024-0018_ref_014","doi-asserted-by":"crossref","unstructured":"B. Y. Xu, L. Sun, X. Q. Mao, R. Y. Ding, and C. W. Liu, \u201cIoT intrusion detection system based on machine learning,\u201d Electronics, vol. 12, no. 20, p. 4289, 2023.","DOI":"10.3390\/electronics12204289"},{"key":"2024121113522606348_j_comp-2024-0018_ref_015","doi-asserted-by":"crossref","unstructured":"Z. G. Jin, J. Y. Zhou, B. Li, X. D. Wu, and C. X. Duan, \u201cFL-IIDS: A novel federated learning-based incremental intrusion detection system,\u201d Future Gener. Comput. Syst., vol. 151, pp. 57\u201370, 2024.","DOI":"10.1016\/j.future.2023.09.019"},{"key":"2024121113522606348_j_comp-2024-0018_ref_016","doi-asserted-by":"crossref","unstructured":"S. Sadhwani, B. Manibalan, and R. Muthalagu, \u201cA lightweight model for DDoS attack detection using machine learning techniques,\u201d Appl. Sci., vol. 13, no. 17, p. 9937, 2023.","DOI":"10.3390\/app13179937"},{"key":"2024121113522606348_j_comp-2024-0018_ref_017","doi-asserted-by":"crossref","unstructured":"G. Sravanthi and M. S. Kumar, \u201cA weight optimized deep learning model for cluster based intrusion detection system,\u201d Opt. Quantum Electron., vol. 55, no. 14, p. 1224, 2023.","DOI":"10.1007\/s11082-023-05509-x"},{"key":"2024121113522606348_j_comp-2024-0018_ref_018","doi-asserted-by":"crossref","unstructured":"N. Kumar and S. Sharma, \u201cA hybrid modified deep learning architecture for intrusion detection system with optimal feature selection,\u201d Electronics, vol. 12, no. 19, p. 4050, 2023.","DOI":"10.3390\/electronics12194050"},{"key":"2024121113522606348_j_comp-2024-0018_ref_019","doi-asserted-by":"crossref","unstructured":"A. Odeh and A. A. Taleb, \u201cEnsemble-based deep learning models for enhancing IoT intrusion detection,\u201d Appl. Sci., vol. 13, no. 21, p. 11985, 2023.","DOI":"10.3390\/app132111985"},{"key":"2024121113522606348_j_comp-2024-0018_ref_020","doi-asserted-by":"crossref","unstructured":"Y. H. Gu, Y. Yang, Y. Yan, F. Shen, and M. Gao, \u201cLearning-based intrusion detection for high-dimensional imbalanced traffic,\u201d Comput. Commun., vol. 212, pp. 366\u2013376, 2023.","DOI":"10.1016\/j.comcom.2023.10.018"},{"key":"2024121113522606348_j_comp-2024-0018_ref_021","doi-asserted-by":"crossref","unstructured":"V. Sreekanth, S. Kamalakanta, and M. Dinesh, \u201cFederated reinforcement learning based intrusion detection system using dynamic attention mechanism,\u201d J. Inf. Secur. Appl., vol. 78, p. 103608, 2023.","DOI":"10.1016\/j.jisa.2023.103608"},{"key":"2024121113522606348_j_comp-2024-0018_ref_022","doi-asserted-by":"crossref","unstructured":"M. Jawad, L. Ming, and R. Mudassar, \u201cAn accurate detection of tool wear type in drilling process by applying PCA and one-hot encoding to SSA-BLSTM model,\u201d Int. J. Adv. Manuf. Technol., vol. 118, no. 11\u201312, pp. 3897\u20133916, 2021.","DOI":"10.1007\/s00170-021-08200-1"},{"key":"2024121113522606348_j_comp-2024-0018_ref_023","doi-asserted-by":"crossref","unstructured":"Z. Ting, G. S. Hu, Y. Yi, and D. Yi, \u201cA super-resolution reconstruction method for shale based on generative adversarial network,\u201d Transp. Porous Media, vol. 150, no. 2, pp. 383\u2013426, 2023.","DOI":"10.1007\/s11242-023-02016-1"},{"key":"2024121113522606348_j_comp-2024-0018_ref_024","doi-asserted-by":"crossref","unstructured":"S. Balaji and S. Sankaranarayanan, \u201cHybrid distributed deep-GAN intrusion detection system in IoT with Autoencoder,\u201d Int. J. Fuzzy Syst. Appl. (IJFSA), vol. 11, no. 4, pp. 1\u201320, 2022.","DOI":"10.4018\/IJFSA.312238"},{"key":"2024121113522606348_j_comp-2024-0018_ref_025","doi-asserted-by":"crossref","unstructured":"X. X. Liao, J. Y. Yuan, Z. M. Cai, and J. H. Lai, \u201cAn attention-based bidirectional GRU network for temporal action proposals generation,\u201d J. Supercomput., vol. 79, no. 8, pp. 8322\u20138339, 2022.","DOI":"10.1007\/s11227-022-04973-8"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2024-0018\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2024-0018\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T18:54:18Z","timestamp":1733943258000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2024-0018\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12,11]]},"published-print":{"date-parts":[[2024,12,11]]}},"alternative-id":["10.1515\/comp-2024-0018"],"URL":"https:\/\/doi.org\/10.1515\/comp-2024-0018","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20240018"}}