{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:11:34Z","timestamp":1772554294188,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T00:00:00Z","timestamp":1644969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s00607-022-01059-4","type":"journal-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T14:02:46Z","timestamp":1645020166000},"page":"553-576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An efficient SGM based IDS in cloud environment"],"prefix":"10.1007","volume":"104","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4808-3370","authenticated-orcid":false,"given":"Partha","family":"Ghosh","sequence":"first","affiliation":[]},{"given":"Zaid","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Ritu Raj","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Santanu","family":"Phadikar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,16]]},"reference":[{"issue":"11","key":"1059_CR1","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1007\/s00607-016-0495-8","volume":"98","author":"HA Kholidy","year":"2016","unstructured":"Kholidy HA, Erradi A, Abdelwahed S, Baiardi F (2016) A risk mitigation approach for autonomous cloud intrusion response system. Computing 98(11):1111\u20131135","journal-title":"Computing"},{"issue":"1","key":"1059_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00607-010-0140-x","volume":"91","author":"LM Vaquero","year":"2010","unstructured":"Vaquero LM, Rodero-Merino L, Mor\u00e1n D (2010) Locking the sky: a survey on iaas cloud security. Computing 91(1):93\u2013118","journal-title":"Computing"},{"key":"1059_CR3","doi-asserted-by":"crossref","unstructured":"Paul V, Mathew R (2019) Data storage security issues in cloud computing. In: International conference on Computer Networks, Big data and IoT. Springer, pp 177\u2013187","DOI":"10.1007\/978-3-030-43192-1_20"},{"issue":"1","key":"1059_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: a comprehensive review. J Netw Comput Appl 36(1):16\u201324","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1059_CR5","doi-asserted-by":"publisher","first-page":"3961","DOI":"10.1007\/s10586-018-2557-5","volume":"22","author":"M Manickam","year":"2019","unstructured":"Manickam M, Rajagopalan S (2019) A hybrid multi-layer intrusion detection system in cloud. Clust Comput 22(2):3961\u20133969","journal-title":"Clust Comput"},{"issue":"4","key":"1059_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.9790\/0661-16471626","volume":"16","author":"P Ghosh","year":"2014","unstructured":"Ghosh P, Debnath C, Metia D, Dutta R (2014) An efficient hybrid multilevel intrusion detection system in cloud environment. IOSR J Comput Eng 16(4):16\u201326","journal-title":"IOSR J Comput Eng"},{"issue":"7","key":"1059_CR7","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1049\/iet-com.2019.0502","volume":"14","author":"F Safara","year":"2020","unstructured":"Safara F, Souri A, Serrizadeh M (2020) Improved intrusion detection method for communication networks using association rule mining and artificial neural networks. IET Commun 14(7):1192\u20131197","journal-title":"IET Commun"},{"issue":"8","key":"1059_CR8","doi-asserted-by":"publisher","first-page":"6882","DOI":"10.1109\/JIOT.2020.2970501","volume":"7","author":"M Eskandari","year":"2020","unstructured":"Eskandari M, Janjua ZH, Vecchio M, Antonelli F (2020) Passban ids: an intelligent anomaly-based intrusion detection system for iot edge devices. IEEE Internet Things J 7(8):6882\u20136897","journal-title":"IEEE Internet Things J"},{"key":"1059_CR9","doi-asserted-by":"crossref","unstructured":"Younge AJ, VonLaszewski G, Wang L, Lopez-Alarcon S, Carithers W (2010) Efficient resource management for cloud computing environments. In: International conference on green computing. IEEE, pp 357\u2013364","DOI":"10.1109\/GREENCOMP.2010.5598294"},{"key":"1059_CR10","doi-asserted-by":"crossref","unstructured":"Zhu K, Song H, Liu L, Gao J, Cheng G (2011) Hybrid genetic algorithm for cloud computing applications. In: IEEE Asia-pacific services computing conference. IEEE, pp 182\u2013187","DOI":"10.1109\/APSCC.2011.66"},{"key":"1059_CR11","unstructured":"Xia T, Qu G, Hariri S, Yousif M (2005) An efficient network intrusion detection method based on information theory and genetic algorithm. In: PCCC, 24th IEEE international performance, computing, and communications conference, 2005. IEEE, pp 11\u201317"},{"issue":"2","key":"1059_CR12","first-page":"26","volume":"1","author":"M Bahrololum","year":"2009","unstructured":"Bahrololum M, Salahi E, Khaleghi M (2009) Anomaly intrusion detection design using hybrid of unsupervised and supervised neural network. Int J Comput Netw Commun (IJCNC) 1(2):26\u201333","journal-title":"Int J Comput Netw Commun (IJCNC)"},{"key":"1059_CR13","doi-asserted-by":"crossref","unstructured":"Ahmed P, et al (2014) A hybrid-based feature selection approach for ids. In: Networks and communications (NetCom2013). Springer, pp 195\u2013211","DOI":"10.1007\/978-3-319-03692-2_16"},{"key":"1059_CR14","unstructured":"MendozaPalechor FE, DeLa HozCorrea EM, DeLa HozManotas AK (2014) Application of feast (feature selection toolbox) in ids (intrusion detection systems)"},{"issue":"1","key":"1059_CR15","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s10586-017-0971-8","volume":"21","author":"AJ Malik","year":"2018","unstructured":"Malik AJ, Khan FA (2018) A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust Comput 21(1):667\u2013680","journal-title":"Clust Comput"},{"key":"1059_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2017.07.005","volume":"134","author":"MG Raman","year":"2017","unstructured":"Raman MG, Somu N, Kirthivasan K, Liscano R, Sriram VS (2017) An efficient intrusion detection system based on hypergraph-genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl Based Syst 134:1\u201312","journal-title":"Knowl Based Syst"},{"issue":"1","key":"1059_CR17","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s10586-015-0527-8","volume":"19","author":"S-H Kang","year":"2016","unstructured":"Kang S-H, Kim KJ (2016) A feature selection approach to find optimal feature subsets for the network intrusion detection system. Clust Comput 19(1):325\u2013333","journal-title":"Clust Comput"},{"key":"1059_CR18","doi-asserted-by":"crossref","unstructured":"DeLaHoz E, Ortiz A, Ortega J, Dela Hoz E,(2013) Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques. In: International conference on hybrid artificial intelligence systems. Springer, pp 103\u2013111","DOI":"10.1007\/978-3-642-40846-5_11"},{"key":"1059_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.comnet.2018.02.028","volume":"136","author":"V Hajisalem","year":"2018","unstructured":"Hajisalem V, Babaie S (2018) A hybrid intrusion detection system based on abc-afs algorithm for misuse and anomaly detection. Comput Netw 136:37\u201350","journal-title":"Comput Netw"},{"key":"1059_CR20","doi-asserted-by":"crossref","unstructured":"Alzubi QM, Anbar M, Alqattan ZN, Al-Betar MA, Abdullah R (2019) Intrusion detection system based on a modified binary grey wolf optimisation. In: Neural computing and applications, pp 1\u201313","DOI":"10.1007\/s00521-019-04103-1"},{"issue":"2","key":"1059_CR21","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s10586-013-0290-7","volume":"17","author":"S Sakr","year":"2014","unstructured":"Sakr S (2014) Cloud-hosted databases: technologies, challenges and opportunities. Clust Comput 17(2):487\u2013502","journal-title":"Clust Comput"},{"key":"1059_CR22","doi-asserted-by":"crossref","unstructured":"Manogaran G, Chilamkurti N, Hsu C-H (2018) Special issue on machine learning algorithms for internet of things, fog computing and cloud computing","DOI":"10.1007\/s00607-018-0644-3"},{"issue":"1","key":"1059_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12862-016-0702-4","volume":"16","author":"JP Jahner","year":"2016","unstructured":"Jahner JP, Gibson D, Weitzman CL, Blomberg EJ, Sedinger JS, Parchman TL (2016) Fine-scale genetic structure among greater sage-grouse leks in central nevada. BMC Evol Biol 16(1):1\u201313","journal-title":"BMC Evol Biol"},{"issue":"1","key":"1059_CR24","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1093\/beheco\/ars132","volume":"24","author":"KL Bird","year":"2013","unstructured":"Bird KL, Aldridge CL, Carpenter JE, Paszkowski CA, Boyce MS, Coltman DW (2013) The secret sex lives of sage-grouse: multiple paternity and intraspecific nest parasitism revealed through genetic analysis. Behav Ecol 24(1):29\u201338","journal-title":"Behav Ecol"},{"key":"1059_CR25","doi-asserted-by":"crossref","unstructured":"Qiu S, Wang D, Xu G, Kumari S,(2020) Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. In: IEEE transactions on dependable and secure computing, vol 17, no. 3","DOI":"10.1109\/TDSC.2020.3022797"},{"key":"1059_CR26","unstructured":"Li Z, Wang D, Morais E (2020) Quantum-safe round-optimal password authentication for mobile devices. In: IEEE transactions on dependable and secure computing"},{"key":"1059_CR27","doi-asserted-by":"crossref","unstructured":"Bonneau J, Herley C, VanOorschot PC, Stajano F (2012) The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE symposium on security and privacy. IEEE 2012, pp 553\u2013567","DOI":"10.1109\/SP.2012.44"},{"issue":"9","key":"1059_CR28","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inf 14(9):4081\u20134092","journal-title":"IEEE Trans Industr Inf"},{"key":"1059_CR29","doi-asserted-by":"crossref","unstructured":"Eberz S, Rasmussen KB, Lenders V, Martinovic I (2017) Evaluating behavioral biometrics for continuous authentication: challenges and metrics. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp 386\u2013399","DOI":"10.1145\/3052973.3053032"},{"issue":"4","key":"1059_CR30","first-page":"708","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput 15(4):708\u2013722","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1059_CR31","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V et al (2011) Scikit-learn: machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"1059_CR32","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: IEEE symposium on computational intelligence for security and defense applications. IEEE, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"4","key":"1059_CR33","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/IJISMD.2017100102","volume":"8","author":"P Ghosh","year":"2017","unstructured":"Ghosh P, Bardhan M, Chowdhury NR, Phadikar S et al (2017) Ids using reinforcement learning automata for preserving security in cloud environment. Int J Inf Syst Model Des (IJISMD) 8(4):21\u201337","journal-title":"Int J Inf Syst Model Des (IJISMD)"},{"issue":"1","key":"1059_CR34","first-page":"107","volume":"8","author":"LM Ibrahim","year":"2013","unstructured":"Ibrahim LM, Basheer DT, Mahmod MS (2013) A comparison study for intrusion database (kdd99, nsl-kdd) based on self organization map (som) artificial neural network. J Eng Sci Technol 8(1):107\u2013119","journal-title":"J Eng Sci Technol"},{"key":"1059_CR35","doi-asserted-by":"crossref","unstructured":"Proti\u0107 DD (2018) Review of kdd cup\u201999, nsl-kdd and kyoto 2006+ datasets. Vojnotehni\u010dki glasnik 66(3):580\u2013596","DOI":"10.5937\/vojtehg66-16670"},{"issue":"22","key":"1059_CR36","doi-asserted-by":"publisher","first-page":"8609","DOI":"10.1016\/j.eswa.2015.07.015","volume":"42","author":"R Singh","year":"2015","unstructured":"Singh R, Kumar H, Singla R (2015) An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst Appl 42(22):8609\u20138624","journal-title":"Expert Syst Appl"},{"key":"1059_CR37","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2011","unstructured":"Han J, Pei J, Kamber M (2011) Data mining: concepts and techniques. Elsevier, New York"},{"issue":"2","key":"1059_CR38","first-page":"150","volume":"4","author":"M Jamil","year":"2013","unstructured":"Jamil M, Yang X-S (2013) A literature survey of benchmark functions for global optimisation problems. Int J Math Model Numer Optim 4(2):150\u2013194","journal-title":"Int J Math Model Numer Optim"},{"key":"1059_CR39","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"1059_CR40","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN\u201995-international conference on neural networks, vol 4. IEEE, pp 1942\u20131948","DOI":"10.1109\/ICNN.1995.488968"},{"issue":"13","key":"1059_CR41","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) Gsa: a gravitational search algorithm. Inf Sci 179(13):2232\u20132248","journal-title":"Inf Sci"},{"issue":"4","key":"1059_CR42","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11(4):341\u2013359","journal-title":"J Global Optim"},{"issue":"2","key":"1059_CR43","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/4235.771163","volume":"3","author":"X Yao","year":"1999","unstructured":"Yao X, Liu Y, Lin G (1999) Evolutionary programming made faster. IEEE Trans Evol Comput 3(2):82\u2013102","journal-title":"IEEE Trans Evol Comput"},{"key":"1059_CR44","doi-asserted-by":"crossref","unstructured":"Ghosh P, Mandal AK, Kumar R (2015) An efficient cloud network intrusion detection system. In: Information systems design and intelligent applications. Springer, pp 91\u201399","DOI":"10.1007\/978-81-322-2250-7_10"},{"key":"1059_CR45","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.asoc.2015.04.041","volume":"33","author":"S Rastegari","year":"2015","unstructured":"Rastegari S, Hingston P, Lam C-P (2015) Evolving statistical rulesets for network intrusion detection. Appl Soft Comput 33:348\u2013359","journal-title":"Appl Soft Comput"},{"key":"1059_CR46","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.ins.2017.06.007","volume":"414","author":"AA Aburomman","year":"2017","unstructured":"Aburomman AA, Reaz MBI (2017) A novel weighted support vector machines multiclass classifier based on differential evolution for intrusion detection systems. Inf Sci 414:225\u2013246","journal-title":"Inf Sci"},{"issue":"12","key":"1059_CR47","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1002\/sec.403","volume":"5","author":"M Mohammadi","year":"2012","unstructured":"Mohammadi M, Raahemi B, Akbari A, Nassersharif B (2012) New class-dependent feature transformation for intrusion detection systems. Secur Commun Netw 5(12):1296\u20131311","journal-title":"Secur Commun Netw"},{"key":"1059_CR48","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.neucom.2016.03.031","volume":"199","author":"SMH Bamakan","year":"2016","unstructured":"Bamakan SMH, Wang H, Yingjie T, Shi Y (2016) An effective intrusion detection framework based on mclp\/svm optimized by time-varying chaos particle swarm optimization. Neurocomputing 199:90\u2013102","journal-title":"Neurocomputing"},{"issue":"1","key":"1059_CR49","first-page":"13","volume":"15","author":"MM Abd-Eldayem","year":"2014","unstructured":"Abd-Eldayem MM (2014) A proposed http service based ids. Egypt Inf J 15(1):13\u201324","journal-title":"Egypt Inf J"},{"issue":"4","key":"1059_CR50","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim G, Lee S, Kim S (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41(4):1690\u20131700","journal-title":"Expert Syst Appl"},{"key":"1059_CR51","doi-asserted-by":"crossref","unstructured":"Gogoi P, Bhuyan MH, Bhattacharyya D, Kalita JK (2012) Packet and flow based network intrusion dataset. In: International conference on contemporary computing. Springer, pp 322\u2013334","DOI":"10.1007\/978-3-642-32129-0_34"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01059-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-022-01059-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01059-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:15:24Z","timestamp":1648664124000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-022-01059-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,16]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1059"],"URL":"https:\/\/doi.org\/10.1007\/s00607-022-01059-4","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,16]]},"assertion":[{"value":"28 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}