{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T15:03:09Z","timestamp":1775746989447,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:00:00Z","timestamp":1662163200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T00:00:00Z","timestamp":1662163200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10207-022-00611-9","type":"journal-article","created":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T19:33:30Z","timestamp":1662233610000},"page":"1263-1282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9022-0634","authenticated-orcid":false,"given":"C.","family":"Prajisha","sequence":"first","affiliation":[]},{"given":"A. R.","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,3]]},"reference":[{"key":"611_CR1","first-page":"04","volume":"17","author":"S Li","year":"2014","unstructured":"Li, S., Li, X., Zhao, S.: The internet of things: a survey. Inf. Syst. Front. 17, 04 (2014)","journal-title":"Inf. Syst. Front."},{"issue":"3","key":"611_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/fi12030055","volume":"12","author":"G Nebbione","year":"2020","unstructured":"Nebbione, G., Calzarossa, M.C.: Security of IoT application layer protocols: challenges and findings. Futur. Internet 12(3), 55 (2020)","journal-title":"Futur. Internet"},{"key":"611_CR3","first-page":"01","volume":"4","author":"M Ajdani","year":"2021","unstructured":"Ajdani, M., Ghaffary, H.: Introduced a new method for enhancement of intrusion detection with random forest and pso algorithm. Securi. Priv. 4, 01 (2021)","journal-title":"Securi. Priv."},{"key":"611_CR4","doi-asserted-by":"crossref","unstructured":"Chen, F., Ye, Z., Wang, C., Yan, L., Wang, R.: A feature selection approach for network intrusion detection based on tree-seed algorithm and k-nearest neighbor. 68\u201372 (2018)","DOI":"10.1109\/IDAACS-SWS.2018.8525522"},{"key":"611_CR5","unstructured":"Panda, M., Patra, M.: Network intrusion detection using naive bayes. 7, 12 (2007)"},{"key":"611_CR6","doi-asserted-by":"crossref","unstructured":"Amor, N.B., Salem, Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. 1, 420\u2013424 (2004)","DOI":"10.1145\/967900.967989"},{"key":"611_CR7","doi-asserted-by":"crossref","unstructured":"Gu, J., Wang, L., Chung, Y., Wang, S.: A novel approach to intrusion detection using svm ensemble with feature augmentation. 06 (2019)","DOI":"10.1016\/j.cose.2019.05.022"},{"issue":"12","key":"611_CR8","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.asej.2013.01.003","volume":"4","author":"R Elbasiony","year":"2013","unstructured":"Elbasiony, R., Sallam, E., Eltobely, T., Fahmy, M.: A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng. J. 4(12), 753\u2013762 (2013)","journal-title":"Ain Shams Eng. J."},{"key":"611_CR9","first-page":"02","volume":"32","author":"M Ramaiah","year":"2021","unstructured":"Ramaiah, M., Chandrasekaran, V., Ravi, V., Kumar, N.: An intrusion detection system using optimized deep neural network architecture. Trans. Emerg. Telecommun. Technol. 32, 02 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"611_CR10","first-page":"09","volume":"163","author":"H Liu","year":"2018","unstructured":"Liu, H., Lang, B., Liu, Ming, Yan, H.: Cnn and rnn based payload classification methods for attack detection. Knowledge-Based Syst. 163, 09 (2018)","journal-title":"Knowledge-Based Syst."},{"key":"611_CR11","doi-asserted-by":"crossref","unstructured":"Andy, S., Rahardjo, B., Hanindhito, B.: Attack scenarios and security analysis of MQTT communication protocol in IoT system. 1\u20136 (2017)","DOI":"10.11591\/eecsi.v4.1064"},{"key":"611_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_435","volume-title":"Transport layer security (TLS)","author":"C Heinrich","year":"2005","unstructured":"Heinrich, C.: Transport layer security (TLS). Springer, Boston (2005)"},{"key":"611_CR13","doi-asserted-by":"crossref","unstructured":"Perrone, G., Vecchio, M., Pecori, R., Giaffreda, R.: The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an army of iot devices. In IoTBDS, (2017)","DOI":"10.5220\/0006287302460253"},{"issue":"4","key":"611_CR14","first-page":"482","volume":"4","author":"NF Syed","year":"2020","unstructured":"Syed, N.F., Baig, Z., Ibrahim, A., Valli, C.: Denial of service attack detection through machine learning for the IoT. J. Inf. Telecommun. 4(4), 482\u2013503 (2020)","journal-title":"J. Inf. Telecommun."},{"issue":"7","key":"611_CR15","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s00607-018-0685-7","volume":"101","author":"MD Alshehri","year":"2019","unstructured":"Alshehri, M.D., Hussain, F.K.: A fuzzy security protocol for trust management in the internet of things (fuzzy-iot). Computing 101(7), 791\u2013818 (2019)","journal-title":"Computing"},{"key":"611_CR16","doi-asserted-by":"crossref","first-page":"04","DOI":"10.1186\/s13638-018-1315-y","volume":"2019","author":"AP Haripriya","year":"2019","unstructured":"Haripriya, A.P., Kanagasabai, K.: Secure-mqtt: an efficient fuzzy logic-based approach to detect dos attack in mqtt protocol for internet of things. EURASIP J. Wirel. Commun. Netw. 2019, 04 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"611_CR17","doi-asserted-by":"crossref","unstructured":"Zahra, S.R., Chishti, M.A.: Fuzzy logic and fog based secure architecture for internet of things (flfsiot). J. Ambient Intell. Hum. Comput. 1\u201325, (2020)","DOI":"10.1007\/s12652-020-02128-2"},{"key":"611_CR18","doi-asserted-by":"crossref","unstructured":"Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1\u20136. IEEE, (2018)","DOI":"10.1109\/ISESD.2018.8605485"},{"key":"611_CR19","doi-asserted-by":"crossref","unstructured":"Da,\u00a0Xu., L., Lu, Y., Li, L.: Embedding blockchain technology into iot for security: a survey. IEEE Int. Things J. (2021)","DOI":"10.1109\/JIOT.2021.3060508"},{"key":"611_CR20","unstructured":"Katende, M.: Combining mqtt and blockchain to improve data security. In: 3rd International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), (2020)"},{"key":"611_CR21","doi-asserted-by":"crossref","unstructured":"Buccafurri, F., Romolo, C.: A blockchain-based otp-authentication scheme for constrainded iot devices using mqtt. In: Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control, pp. 1\u20135, (2019)","DOI":"10.1145\/3386164.3389095"},{"issue":"7","key":"611_CR22","doi-asserted-by":"publisher","first-page":"2002","DOI":"10.3390\/s20072002","volume":"20","author":"F Buccafurri","year":"2020","unstructured":"Buccafurri, F., De Angelis, V., Nardone, R.: Securing mqtt by blockchain-based otp authentication. Sensors 20(7), 2002 (2020)","journal-title":"Sensors"},{"issue":"10","key":"611_CR23","doi-asserted-by":"publisher","first-page":"2798","DOI":"10.3390\/s20102798","volume":"20","author":"AE Guerrero-Sanchez","year":"2020","unstructured":"Guerrero-Sanchez, A.E., Rivas-Araiza, E.A., Gonzalez-Cordoba, J.L., Toledano-Ayala, M., Takacs, A.: Blockchain mechanism and symmetric encryption in a wireless sensor network. Sensors 20(10), 2798 (2020)","journal-title":"Sensors"},{"key":"611_CR24","doi-asserted-by":"crossref","unstructured":"ABDELRAZIG, ABUBAKAR, M.W.R.W.A.N., Jaroucheh, Z., Al-Dubai, A., Liu, X.: Blockchain-based identity and authentication scheme for mqtt protocol. In: 2021 The 3rd International Conference on Blockchain Technology, pp. 73\u201381, (2021)","DOI":"10.1145\/3460537.3460549"},{"key":"611_CR25","doi-asserted-by":"crossref","unstructured":"Alaiz-Moreton, H., Aveleira-Mata, J., Ondicol-Garcia, J., Mu\u00f1oz-Casta\u00f1eda, A.L., Garc\u00eda, I., Benavides, C.: Multiclass classification procedure for detecting attacks on mqtt-iot protocol. Complexity, 2019, (2019)","DOI":"10.1155\/2019\/6516253"},{"key":"611_CR26","doi-asserted-by":"crossref","unstructured":"Ciklabakkal, E., Donmez, A., Erdemir, M., Suren, E., Yilmaz, M.K., Angin, P.: Artemis: an intrusion detection system for mqtt attacks in internet of things. In: 2019 38th Symposium on Reliable Distributed Systems (SRDS), pp. 369\u20133692. IEEE, (2019)","DOI":"10.1109\/SRDS47363.2019.00053"},{"key":"611_CR27","doi-asserted-by":"crossref","unstructured":"Hindy, H., Bayne, E, Bures, M., Atkinson, R., Tachtatzis, C., Bellekens, X.: Machine learning based IoT intrusion detection system: an mqtt case study (mqtt-iot-ids2020 dataset). In: International Networking Conference, pp. 73\u201384. Springer, (2020)","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"611_CR28","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on MQTT. Sensors 20, 11 (2020)","journal-title":"Sensors"},{"key":"611_CR29","first-page":"601","volume":"21","author":"D Dikii","year":"2021","unstructured":"Dikii, D., Arustamov, Sergey, Grishentsev, A.: Dos attacks detection in MQTT networks. Indones. J. Electr. Eng. Comput. Sci. 21, 601 (2021)","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"issue":"21","key":"611_CR30","doi-asserted-by":"publisher","first-page":"7016","DOI":"10.3390\/s21217016","volume":"21","author":"MA Khan","year":"2021","unstructured":"Khan, M.A., Khan, M.A., Jan, S.U., Ahmad, J., Jamal, S.S., Shah, A.A., Pitropakis, N., Buchanan, W.J.: A deep learning-based intrusion detection system for MQTT enabled IoT. Sensors 21(21), 7016 (2021)","journal-title":"Sensors"},{"key":"611_CR31","doi-asserted-by":"publisher","first-page":"117734","DOI":"10.1109\/ACCESS.2021.3107337","volume":"9","author":"DC Attota","year":"2021","unstructured":"Attota, D.C., Mothukuri, V., Parizi, Reza M., Pouriyeh, S.: An ensemble multi-view federated learning intrusion detection for IoT. IEEE Access 9, 117734\u2013117745 (2021)","journal-title":"IEEE Access"},{"key":"611_CR32","doi-asserted-by":"publisher","first-page":"138509","DOI":"10.1109\/ACCESS.2021.3118642","volume":"9","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Friha, O., Maglaras, L., Janicke, H., Shu, L.: Federated deep learning for cyber security in the internet of things: concepts, applications, and experimental analysis. IEEE Access 9, 138509\u2013138542 (2021)","journal-title":"IEEE Access"},{"key":"611_CR33","doi-asserted-by":"crossref","unstructured":"Makhija, J., Shetty, A.A., Bangera, A.: Classification of attacks on MQTT-based IoT system using machine learning techniques. In: International Conference on Innovative Computing and Communications, pp. 217\u2013224. Springer, (2022)","DOI":"10.1007\/978-981-16-3071-2_19"},{"key":"611_CR34","doi-asserted-by":"publisher","first-page":"165907","DOI":"10.1109\/ACCESS.2021.3132127","volume":"9","author":"I Ullah","year":"2021","unstructured":"Ullah, I., Mahmoud, Q.H.: A framework for anomaly detection in IoT networks using conditional generative adversarial networks. IEEE Access 9, 165907\u2013165931 (2021)","journal-title":"IEEE Access"},{"key":"611_CR35","doi-asserted-by":"crossref","unstructured":"Gao, Z., Cao, J., Wang, W., Zhang, H., Xu, Z.: Online-semisupervised neural anomaly detector to identify MQTT-based attacks in real time. Secur. Commun. Netw. 2021, (2021)","DOI":"10.1155\/2021\/4587862"},{"key":"611_CR36","doi-asserted-by":"crossref","unstructured":"Hintaw, A.J., Manickam, S., Aboalmaaly, M.F., Karuppayah, S.: MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT). IETE J. Res. 1\u201330, (2021)","DOI":"10.1080\/03772063.2021.1912651"},{"key":"611_CR37","doi-asserted-by":"publisher","first-page":"112466","DOI":"10.1109\/ACCESS.2021.3102095","volume":"9","author":"A Alsaleh","year":"2021","unstructured":"Alsaleh, A., Binsaeedan, W.: The influence of salp swarm algorithm-based feature selection on network anomaly intrusion detection. IEEE Access 9, 112466\u2013112477 (2021)","journal-title":"IEEE Access"},{"key":"611_CR38","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.advengsoft.2017.07.002","volume":"114","author":"S Mirjalili","year":"2017","unstructured":"Mirjalili, S., Gandomi, A.H., Mirjalili, S.Z., Saremi, S., Faris, H., Mirjalili, S.M.: Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 114, 163\u2013191 (2017)","journal-title":"Adv. Eng. Softw."},{"key":"611_CR39","unstructured":"Tizhoosh, H.R.: Opposition-based learning: a new scheme for machine intelligence. In: International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC\u201906), 1, 695\u2013701. IEEE, (2005)"},{"issue":"1","key":"611_CR40","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s00521-017-2988-6","volume":"31","author":"GI Sayed","year":"2019","unstructured":"Sayed, G.I., Hassanien, A.E., Azar, A.T.: Feature selection via a novel chaotic crow search algorithm. Neural Comput. Appl. 31(1), 171\u2013188 (2019)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"611_CR41","doi-asserted-by":"publisher","first-page":"3801","DOI":"10.1007\/s13369-018-3680-6","volume":"44","author":"AhE Hegazy","year":"2019","unstructured":"Hegazy, Ah.E., Makhlouf, M.A., El-Tawel, Gh.S.: Feature selection using chaotic salp swarm algorithm for data classification. Arab. J. Sci. Eng. 44(4), 3801\u20133816 (2019)","journal-title":"Arab. J. Sci. Eng."},{"key":"611_CR42","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2020.02.008","volume":"520","author":"A Mansouri","year":"2020","unstructured":"Mansouri, A., Wang, X.: A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46\u201362 (2020)","journal-title":"Inf. Sci."},{"key":"611_CR43","doi-asserted-by":"publisher","first-page":"113122","DOI":"10.1016\/j.eswa.2019.113122","volume":"145","author":"M Tubishat","year":"2020","unstructured":"Tubishat, M., Idris, N., Shuib, L., Abushariah, M.A.M., Mirjalili, S.: Improved salp swarm algorithm based on opposition based learning and novel local search algorithm for feature selection. Expert Syst. Appl. 145, 113122 (2020)","journal-title":"Expert Syst. Appl."},{"issue":"19","key":"611_CR44","doi-asserted-by":"publisher","first-page":"14791","DOI":"10.1007\/s00500-020-04832-9","volume":"24","author":"Y Yin","year":"2020","unstructured":"Yin, Y., Qiang, T., Chen, X.: Enhanced salp swarm algorithm based on random walk and its application to training feedforward neural networks. Soft Comput. 24(19), 14791\u201314807 (2020)","journal-title":"Soft Comput."},{"issue":"9","key":"611_CR45","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.3390\/s21092985","volume":"21","author":"SI Popoola","year":"2021","unstructured":"Popoola, S.I., Adebisi, B., Ande, R., Hammoudeh, M., Anoh, K., Atayero, A.A.: Smote-drnn: a deep learning algorithm for botnet detection in the internet-of-things networks. Sensors 21(9), 2985 (2021)","journal-title":"Sensors"},{"key":"611_CR46","unstructured":"Meng, Q.: Lightgbm: a highly efficient gradient boosting decision tree. 04 (2018)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00611-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00611-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00611-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,13]],"date-time":"2022-10-13T15:18:22Z","timestamp":1665674302000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00611-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,3]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["611"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00611-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,3]]},"assertion":[{"value":"3 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}