{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:59:16Z","timestamp":1773269956343,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_7","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:26:29Z","timestamp":1767320789000},"page":"125-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Intrusion Detection Method Based on\u00a0Multi-scale Feature Clustering and\u00a0Improved Honey Badger Algorithm"],"prefix":"10.1007","author":[{"given":"Hanlei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yanqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiafei","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121751","volume":"238","author":"B Sharma","year":"2024","unstructured":"Sharma, B., et al.: Explainable artificial intelligence for intrusion detection in IoT networks: a deep learning based approach. Expert Syst. Appl. 238, 121751 (2024)","journal-title":"Expert Syst. Appl."},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102031","volume":"101","author":"M Almiani","year":"2020","unstructured":"Almiani, M., et al.: Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101, 102031 (2020)","journal-title":"Simul. Model. Pract. Theory"},{"key":"7_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100699","volume":"22","author":"AS Dina","year":"2023","unstructured":"Dina, A.S., Siddique, A.B., Manivannan, D.: A deep learning approach for intrusion detection in internet of things using focal loss function. Internet Things 22, 100699 (2023)","journal-title":"Internet Things"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., et al.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"issue":"2","key":"7_CR5","first-page":"539","volume":"39","author":"X-Y Liu","year":"2008","unstructured":"Liu, X.-Y., Wu, J., Zhou, Z.-H.: Exploratory undersampling for class-imbalance learning. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 39(2), 539\u2013550 (2008)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B (Cybern.)"},{"key":"7_CR6","unstructured":"He, H., et al.: ADASYN: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence). IEEE (2008)"},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s10207-024-00833-z","volume":"23","author":"MA Talukder","year":"2024","unstructured":"Talukder, M.A., et al.: MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs. Int. J. Inf. Secur. 23(3), 2139\u20132158 (2024)","journal-title":"Int. J. Inf. Secur."},{"key":"7_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315","volume":"177","author":"H Zhang","year":"2020","unstructured":"Zhang, H., et al.: An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Comput. Netw. 177, 107315 (2020)","journal-title":"Comput. Netw."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1109\/LGRS.2014.2337320","volume":"12","author":"P Ghamisi","year":"2014","unstructured":"Ghamisi, P., Benediktsson, J.A.: Feature selection based on hybridization of genetic algorithm and particle swarm optimization. IEEE Geosci. Remote Sens. Lett. 12(2), 309\u2013313 (2014)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"7_CR11","volume":"25","author":"M Alazab","year":"2024","unstructured":"Alazab, M., et al.: An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron. Egypt. Inf. J. 25, 100423 (2024)","journal-title":"Egypt. Inf. J."},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00558-z","volume":"9","author":"JL Leevy","year":"2022","unstructured":"Leevy, J.L., Hancock, J., Khoshgoftaar, T.M., Peterson, J.M.: IoT information theft prediction using ensemble feature selection. J. Big Data 9(1), 1\u201348 (2022). https:\/\/doi.org\/10.1186\/s40537-021-00558-z","journal-title":"J. Big Data"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.matcom.2021.08.013","volume":"192","author":"FA Hashim","year":"2022","unstructured":"Hashim, F.A., et al.: Honey badger algorithm: new metaheuristic algorithm for solving optimization problems. Math. Comput. Simul. 192, 84\u2013110 (2022)","journal-title":"Math. Comput. Simul."},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104146","volume":"148","author":"SS Bamber","year":"2025","unstructured":"Bamber, S.S., et al.: A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system. Comput. Secur. 148, 104146 (2025)","journal-title":"Comput. Secur."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Xia, Z., et al.: PSO-GA hyperparameter optimized ResNet-BiGRU based intrusion detection method. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3464529"},{"issue":"3","key":"7_CR16","doi-asserted-by":"publisher","first-page":"3353","DOI":"10.1007\/s40747-023-01313-y","volume":"10","author":"Y Imrana","year":"2024","unstructured":"Imrana, Y., et al.: CNN-GRU-FF: a double-layer feature fusion-based network intrusion detection system using convolutional neural network and gated recurrent units. Complex Intell. Syst. 10(3), 3353\u20133370 (2024)","journal-title":"Complex Intell. Syst."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1(2018), 108\u2013116 (2018)","DOI":"10.5220\/0006639801080116"},{"issue":"13","key":"7_CR18","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto, E.C.P., et al.: CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23(13), 5941 (2023)","journal-title":"Sensors"},{"key":"7_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102834","volume":"121","author":"X Yun","year":"2022","unstructured":"Yun, X., et al.: Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. Comput. Secur. 121, 102834 (2022)","journal-title":"Comput. Secur."},{"issue":"1","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06552-5","volume":"81","author":"OH Abdulganiyu","year":"2025","unstructured":"Abdulganiyu, O.H., et al.: XIDINTFL-VAE: XGBoost-based intrusion detection of imbalance network traffic via class-wise focal loss variational autoencoder. J. Supercomput. 81(1), 1\u201338 (2025)","journal-title":"J. Supercomput."},{"issue":"3","key":"7_CR21","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TNET.2022.3215507","volume":"31","author":"P Lin","year":"2022","unstructured":"Lin, P., et al.: A novel multimodal deep learning framework for encrypted traffic classification. IEEE\/ACM Trans. Networking 31(3), 1369\u20131384 (2022)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s00500-023-09483-0","volume":"28","author":"B Padmavathi","year":"2024","unstructured":"Padmavathi, B., et al.: An optimized Bi-LSTM with random synthetic over-sampling strategy for network intrusion detection. Soft. Comput. 28(1), 777\u2013790 (2024)","journal-title":"Soft. Comput."},{"key":"7_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103587","volume":"137","author":"AV Turukmane","year":"2024","unstructured":"Turukmane, A.V., Devendiran, R.: M-MultiSVM: an efficient feature selection assisted network intrusion detection system using machine learning. Comput. Secur. 137, 103587 (2024)","journal-title":"Comput. Secur."},{"key":"7_CR24","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1569","volume":"9","author":"Z Wang","year":"2023","unstructured":"Wang, Z., et al.: A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization. PeerJ Comput. Sci. 9, e1569 (2023)","journal-title":"PeerJ Comput. Sci."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Fahrezi, S.F., et al. Optimizing performance of AdaBoost algorithm through undersampling and hyperparameter tuning on CICIoT 2023 dataset. Techn\u00e9: Jurnal Ilmiah Elektroteknika 23(2), 175\u2013184 (2024)","DOI":"10.31358\/techne.v23i2.467"},{"issue":"10","key":"7_CR26","first-page":"65","volume":"43","author":"XY Duan","year":"2022","unstructured":"Duan, X.Y., et al.: Network traffic anomaly detection method based on multi-scale characteristic. J. Commun. 43(10), 65\u201376 (2022)","journal-title":"J. Commun."},{"key":"7_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou, W., et al.: Hidim: a novel framework of network intrusion detection for hierarchical dependency and class imbalance. Comput. Secur. 148, 104155 (2025)","journal-title":"Comput. Secur."},{"key":"7_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110973","volume":"257","author":"M Zhan","year":"2025","unstructured":"Zhan, M., et al.: EAPT: an encrypted traffic classification model via adversarial pre-trained transformers. Comput. Netw. 257, 110973 (2025)","journal-title":"Comput. Netw."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Lin, X., et al.: ET-BERT: a contextualized datagram representation with pre-training transformers for encrypted traffic classification. In: Proceedings of the ACM Web Conference 2022 (2022)","DOI":"10.1145\/3485447.3512217"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:36:16Z","timestamp":1773214576000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}