{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T05:14:05Z","timestamp":1773724445850,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T00:00:00Z","timestamp":1692316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T00:00:00Z","timestamp":1692316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00739-2","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T00:01:42Z","timestamp":1692316902000},"page":"315-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment"],"prefix":"10.1007","volume":"23","author":[{"given":"Bhavya","family":"Dhingra","sequence":"first","affiliation":[]},{"given":"Vidhi","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Deepak Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Koyel Datta","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Deepika","family":"Kukreja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,18]]},"reference":[{"key":"739_CR1","unstructured":"Ackermann, R., Wollinger, T., Eigner, H.: Intrusion analysis in an industrial control system environment - the case of a steel mill. In Proceedings of the European Conference on Information Warfare and Security (ECIW), (2015)"},{"key":"739_CR2","unstructured":"Working\u00a0Group, Anti-Phishing.: (APWG). Phishing activity trends report, 3rd quarter 2020. Technical report, (2020)"},{"key":"739_CR3","unstructured":"Michael, J.: Assante and Robert J. Walters. The industrial control system cyber kill chain. Technical report, SANS Institute (2015)"},{"issue":"2","key":"739_CR4","first-page":"46","volume":"8","author":"YM Banadaki","year":"2020","unstructured":"Banadaki, Y.M.: Detecting malicious DNS over https traffic in domain name system using machine learning classifiers. J. Comput. Sci. Appl. 8(2), 46\u201355 (2020)","journal-title":"J. Comput. Sci. Appl."},{"key":"739_CR5","doi-asserted-by":"crossref","unstructured":"Bhati, B.S., Rai, C.S.: Ensemble based approach for intrusion detection using extra tree classifier. In Intelligent Computing in Engineering, 213\u2013220. Springer, (2020)","DOI":"10.1007\/978-981-15-2780-7_25"},{"key":"739_CR6","doi-asserted-by":"crossref","unstructured":"Bigham, J., Gamez, D., Lu, N.: Safeguarding SCADA systems with anomaly detection. In International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 171\u2013182. Springer, (2003)","DOI":"10.1007\/978-3-540-45215-7_14"},{"key":"739_CR7","unstructured":"Bloomberg. Honda says cyber attack impacts production, global operations. https:\/\/www.bloomberg.com\/news\/articles\/2020-06-09\/honda-says-cyber-attack-impacts-production-global-operations, (2020)"},{"issue":"11","key":"739_CR8","doi-asserted-by":"publisher","first-page":"28960","DOI":"10.3390\/s151128960","volume":"15","author":"I Butun","year":"2015","unstructured":"Butun, I., Ra, I.-H., Sankar, R.: An intrusion detection system based on multi-level clustering for hierarchical wireless sensor networks. Sensors 15(11), 28960\u201328978 (2015)","journal-title":"Sensors"},{"key":"739_CR9","unstructured":"Check Point Research. Securing SCADA systems in the modern threat landscape. Technical report, (2020)"},{"key":"739_CR10","unstructured":"Cheung, S., Dutertre, B., Fong, M., Lindqvist, U., Skinner, K., Valdes, A.: Using model-based intrusion detection for scada networks. In Proceedings of the SCADA Security Scientific Symposium, Miami Beach, Florida, (2007)"},{"key":"739_CR11","unstructured":"Doumit, S.S., Agrawal, D.P.: Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks. In IEEE Military Communications Conference, 2003. MILCOM 2003., volume\u00a01, 609\u2013614 Vol.1, (2003)"},{"key":"739_CR12","doi-asserted-by":"crossref","unstructured":"D\u00fcssel, Patrick, Gehl, Christian, Laskov, Pavel, Bu\u00dfer, Jens-Uwe, St\u00f6rmann, Christof, K\u00e4stner, Jan, Cyber-critical infrastructure protection using real-time payload-based anomaly detection. In International Workshop on Critical Information Infrastructures Security, 85\u201397. Springer, (2009)","DOI":"10.1007\/978-3-642-14379-3_8"},{"key":"739_CR13","unstructured":"Freund, Y., Schapire, R.E.: Experiments with a new boosting algorithm. In Proceedings of the Thirteenth International Conference on International Conference on Machine Learning, ICML\u201996, page 148-156, San Francisco, CA, USA, (1996). Morgan Kaufmann Publishers Inc"},{"key":"739_CR14","unstructured":"Ghernaouti-H\u00e9lie, S.: Cybersecurity for Industrial Control Systems: SCADA, DCS. HMI, and SIS. ISTE Ltd. and Wiley, PLC (2018)"},{"key":"739_CR15","doi-asserted-by":"crossref","unstructured":"Gonzalez, J., Papa, M., Passive scanning in MODBUS networks. In International Conference on Critical Infrastructure Protection, 175\u2013187. Springer, (2007)","DOI":"10.1007\/978-0-387-75462-8_13"},{"key":"739_CR16","unstructured":"iSIGHT Partners. Blackenergy apt attacks against Ukrainian energy sector. Technical report, December (2015)"},{"issue":"4","key":"739_CR17","doi-asserted-by":"publisher","first-page":"3428","DOI":"10.1109\/TSG.2020.2973681","volume":"11","author":"M Ismail","year":"2020","unstructured":"Ismail, M., Shaaban, M.F., Naidu, M., Serpedin, E.: Deep learning detection of electricity theft cyber-attacks in renewable distributed generation. IEEE Trans. Smart Grid 11(4), 3428\u20133437 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"key":"739_CR18","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan, S.U., Ahmed, S., Shakhov, V., Koo, I.: Toward a lightweight intrusion detection system for the internet of things. IEEE Access 7, 42450\u201342471 (2019)","journal-title":"IEEE Access"},{"key":"739_CR19","doi-asserted-by":"crossref","unstructured":"Jazdi, N.: Cyber physical systems in the context of industry 4.0. In 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, 1\u20134. IEEE, (2014)","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"739_CR20","doi-asserted-by":"crossref","unstructured":"Jin, C., Valizadeh, S., van Dijk, M.: Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems. In 2018 IEEE Industrial Cyber-Physical Systems (ICPS), 824\u2013829, (2018)","DOI":"10.1109\/ICPHYS.2018.8390813"},{"key":"739_CR21","doi-asserted-by":"crossref","unstructured":"Li, B., Yuhao, W., Song, J., Rongxing, L., Li, T. Liang, Z.: Federated deep learning for intrusion detection in industrial cyber-physical systems, Deepfed (2021)","DOI":"10.1109\/TII.2020.3023430"},{"key":"739_CR22","doi-asserted-by":"crossref","unstructured":"Liu, X., Wang, H., Zhang, X., Luan, H., Sha, Y., Yan, Y.: A method based on multiple population genetic algorithm to select hyper-parameters of industrial intrusion detection classifier, (2021)","DOI":"10.24846\/v30i3y202104"},{"key":"739_CR23","doi-asserted-by":"crossref","unstructured":"Maglaras, L.A., Jiang, J.: Intrusion detection in SCADA systems using machine learning techniques, (2014)","DOI":"10.1109\/SAI.2014.6918252"},{"issue":"4","key":"739_CR24","doi-asserted-by":"publisher","first-page":"460","DOI":"10.3390\/fi5040460","volume":"5","author":"M Mantere","year":"2013","unstructured":"Mantere, M., Sailio, M., Noponen, S.: Network traffic features for anomaly detection in specific industrial control system network. Future Internet 5(4), 460\u2013473 (2013)","journal-title":"Future Internet"},{"issue":"2","key":"739_CR25","first-page":"828","volume":"17","author":"R Marinho","year":"2015","unstructured":"Marinho, R., Costa, R.: Air-gapped systems: a survey of vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 17(2), 828\u2013844 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"739_CR26","unstructured":"Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data logging for intrusion detection system research. In Seventh Annual Southeastern Cyber Security Summit, (2015)"},{"key":"739_CR27","doi-asserted-by":"crossref","unstructured":"Ouyang, Y., Li, B., Kong, Q., Song, H., Tao L.: A novel few-shot learning based intrusion detection system for scada networks, Fs-ids (2021)","DOI":"10.1109\/ICC42927.2021.9500667"},{"key":"739_CR28","unstructured":"OWASP (Open Web Application Security Project). SQL Injection. https:\/\/owasp.org\/www-community\/attacks\/SQL_Injection"},{"key":"739_CR29","doi-asserted-by":"crossref","unstructured":"Qi, G., Zhou, J., Jia, W., Liu, M., Zhang, S., Xu, M.: Intrusion detection for network based on elite clone artificial bee colony and back propagation neural network, (2021)","DOI":"10.1155\/2021\/9956371"},{"issue":"3","key":"739_CR30","first-page":"4627","volume":"6","author":"F Chao Qiu","year":"2018","unstructured":"Chao Qiu, F., Richard, Yu., Yao, H., Jiang, C., Fangmin, X., Zhao, C.: Blockchain-based software-defined industrial internet of things: a dueling deep $$q$$-learning approach. IEEE Internet Things J. 6(3), 4627\u20134639 (2018)","journal-title":"IEEE Internet Things J."},{"key":"739_CR31","doi-asserted-by":"crossref","unstructured":"Qu, H., Lei, L., Tang, X., Wang, P.: A lightweight intrusion detection method based on fuzzy clustering algorithm for wireless sensor networks, (2018)","DOI":"10.1155\/2018\/4071851"},{"issue":"1","key":"739_CR32","first-page":"502","volume":"22","author":"P Radoglou-Grammatikis","year":"2020","unstructured":"Radoglou-Grammatikis, P., Stergiou, C.: Cybersecurity in industrial control systems: a survey. IEEE Commun. Surv. Tutor. 22(1), 502\u2013524 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"739_CR33","doi-asserted-by":"crossref","unstructured":"Sharaff, A., Gupta, H.: Extra-tree classifier with metaheuristics approach for email classification. In Advances in Computer Communication and Computational Sciences, 189\u2013197. Springer, (2019)","DOI":"10.1007\/978-981-13-6861-5_17"},{"key":"739_CR34","doi-asserted-by":"crossref","unstructured":"Sharma, R.K., Kalita, H.K., Borah, P.: Analysis of machine learning techniques based intrusion detection systems. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, 485\u2013493. Springer, (2016)","DOI":"10.1007\/978-81-322-2529-4_51"},{"issue":"3","key":"739_CR35","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TGRS.2014.2344442","volume":"53","author":"L Sun","year":"2014","unstructured":"Sun, L., Zebin, W., Liu, J., Xiao, L., Wei, Z.: Supervised spectral-spatial hyperspectral image classification with weighted Markov random fields. IEEE Trans. Geosci. Remote Sens. 53(3), 1490\u20131503 (2014)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"739_CR36","doi-asserted-by":"crossref","unstructured":"Tian, J., Gao, M., Zhou, S.: Wireless sensor network for community intrusion detection system based on classify support vector machine. In 2009 International Conference on Information and Automation, 1217\u20131221. IEEE, (2009)","DOI":"10.1109\/ICINFA.2009.5205102"},{"key":"739_CR37","doi-asserted-by":"crossref","unstructured":"Ullah, I., Mahmoud, Q.H.: An intrusion detection framework for the smart grid. In 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), 1\u20135, (2017)","DOI":"10.1109\/CCECE.2017.7946654"},{"issue":"11","key":"739_CR38","doi-asserted-by":"publisher","first-page":"4766","DOI":"10.1109\/TII.2018.2804669","volume":"14","author":"H Wang","year":"2018","unstructured":"Wang, H., Ruan, J., Wang, G., Zhou, B., Liu, Y., Xueqian, F., Peng, J.: Deep learning-based interval state estimation of ac smart grids against sparse cyber attacks. IEEE Trans. Industr. Inf. 14(11), 4766\u20134778 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"739_CR39","doi-asserted-by":"crossref","unstructured":"Wang, Y., Xu, Z., Zhang, J., Xu, L. Wang, H., Gu, G.: Srid: State relation based intrusion detection for false data injection attacks in SCADA. In European symposium on research in computer security, 401\u2013418. Springer, (2014)","DOI":"10.1007\/978-3-319-11212-1_23"},{"key":"739_CR40","unstructured":"Yang, D., Usynin, A., Hines, J.: Anomaly-based intrusion detection for SCADA systems. 07 (2008)"},{"key":"739_CR41","doi-asserted-by":"crossref","unstructured":"Yang, H., Cheng, L., Chuah, M.C.: Deep-learning-based network intrusion detection for SCADA systems, Jun (2019)","DOI":"10.1109\/CNS.2019.8802785"},{"issue":"5","key":"739_CR42","doi-asserted-by":"publisher","first-page":"4257","DOI":"10.1109\/TIE.2017.2772190","volume":"65","author":"J Yang","year":"2017","unstructured":"Yang, J., Zhou, C., Yang, S., Haizhou, X., Bowen, H.: Anomaly detection based on zone partition for security protection of industrial cyber-physical systems. IEEE Trans. Industr. Electron. 65(5), 4257\u20134267 (2017)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"3","key":"739_CR43","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TPWRD.2014.2300099","volume":"29","author":"Y Yang","year":"2014","unstructured":"Yang, Y., McLaughlin, K., Sezer, S., Littler, T., Im, E.G., Pranggono, B., Wang, H.F.: Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans. Power Delivery 29(3), 1092\u20131102 (2014)","journal-title":"IEEE Trans. Power Delivery"},{"key":"739_CR44","unstructured":"ZDNet. Norsk hydro ransomware attack cost the firm \\$45m so far. https:\/\/www.zdnet.com\/article\/norsk-hydro-ransomware-attack-cost-the-firm-45m-so-far\/, April (2019)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00739-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00739-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00739-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T20:08:12Z","timestamp":1705954092000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00739-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,18]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["739"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00739-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,18]]},"assertion":[{"value":"18 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors did not receive support from any organization for the submitted work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}