{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T07:10:07Z","timestamp":1764573007856,"version":"3.46.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10207-025-01139-4","type":"journal-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T16:57:33Z","timestamp":1761152253000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unauthorized iot devices detection based on network traffic using augmentation fusion classification method"],"prefix":"10.1007","volume":"24","author":[{"given":"Duong","family":"Van Dan","sequence":"first","affiliation":[]},{"given":"Ta Minh","family":"Thanh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,22]]},"reference":[{"key":"1139_CR1","unstructured":"Vailshery, L.\u00a0S.: \u201cNumber of internet of things (iot) connected devices worldwide from 2019 to 2021, with forecasts from 2022 to 2030,\u201d Available at https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/ (2022\/27\/12)"},{"key":"1139_CR2","unstructured":"Cisco, \u201cCisco annual internet report (2018 2023),\u201d Available at https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.pdf (2022\/12\/06)"},{"key":"1139_CR3","unstructured":"Robinson, T.: \u201cInterpol warns iot devices at risk,\u201d Available at https:\/\/www.scmagazine.com\/news\/architecture\/interpol-warns-iot-devices-at-risk (2022\/27\/12)"},{"key":"1139_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/ICSSA.2017.12","volume":"2017","author":"J Margolis","year":"2017","unstructured":"Margolis, J., Oh, T.T., Jadhav, S., Kim, Y.H., Kim, J.N.: \u201cAn in-depth analysis of the mirai botnet,\u2019\u2019 in. International Conference on Software Security and Assurance (ICSSA) 2017, 6\u201312 (2017)","journal-title":"International Conference on Software Security and Assurance (ICSSA)"},{"key":"1139_CR5","unstructured":"\u201cShodan,\u201d Available at https:\/\/www.shodan.io\/ (2022\/27\/12)"},{"key":"1139_CR6","unstructured":"\u201cOwasp iot top 10 2018,\u201d Available at https:\/\/owasp.org\/www-pdf-archive\/OWASP-IoT-Top-10-2018-final.pdf (2022\/27\/12)"},{"key":"1139_CR7","doi-asserted-by":"crossref","unstructured":"Tahaei, H., Afifi, F., Asemi, A., Zaki, F., Anuar, N.\u00a0B.: \u201cThe rise of traffic classification in iot networks: A survey,\u201d Journal of Network and Computer Applications, 154, 102538, (2020). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804520300126","DOI":"10.1016\/j.jnca.2020.102538"},{"issue":"1","key":"1139_CR8","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/JIOT.2021.3099028","volume":"9","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Machine learning for the detection and identification of internet of things devices: A survey. IEEE Internet Things J. 9(1), 298\u2013320 (2022)","journal-title":"IEEE Internet Things J."},{"key":"1139_CR9","doi-asserted-by":"publisher","unstructured":"Chowdhury, R.\u00a0R., Aneja, S., Aneja, N., Abas, E.: \u201cNetwork traffic analysis based iot device identification,\u201d in Proceedings of the 2020 4th International Conference on Big Data and Internet of Things, ser. BDIOT \u201920. New York, NY, USA: Association for Computing Machinery, 79-89 (2020). [Online]. Available: https:\/\/doi.org\/10.1145\/3421537.3421545","DOI":"10.1145\/3421537.3421545"},{"key":"1139_CR10","doi-asserted-by":"publisher","unstructured":"Sivanandam, S., Deepa, S.: Genetic Algorithms.Berlin, Heidelberg: Springer Berlin Heidelberg, 15\u201337 (2008). [Online]. Available: https:\/\/doi.org\/10.1007\/978-3-540-73190-0_2","DOI":"10.1007\/978-3-540-73190-0_2"},{"key":"1139_CR11","doi-asserted-by":"crossref","unstructured":"Nie, F., Zhu, W., Li, X.: \u201cDecision tree svm: An extension of linear svm for non-linear classification,\u201d Neurocomputing, 401, 153\u2013159, (2020). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0925231219314304","DOI":"10.1016\/j.neucom.2019.10.051"},{"key":"1139_CR12","doi-asserted-by":"crossref","unstructured":"Kumar, M.\u00a0Arun, Gopal, M.: \u201cA hybrid svm based decision tree,\u201d Pattern Recognition, 43(12), 3977\u20133987, (2010). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320310003067","DOI":"10.1016\/j.patcog.2010.06.010"},{"key":"1139_CR13","doi-asserted-by":"crossref","unstructured":"Aksoy, A., Gunes, M.\u00a0H.: \u201cAutomated iot device identification using network traffic,\u201d in ICC 2019 - 2019 IEEE International Conference on Communications (ICC), 1\u20137 (2019)","DOI":"10.1109\/ICC.2019.8761559"},{"key":"1139_CR14","doi-asserted-by":"crossref","unstructured":"Alissa, K., Alyas, T., Zafar, K., Abbas, Q., Tabassum, N., Sakib, S.: \u201cBotnet attack detection in iot using machine learning,\u201d Computational Intelligence and Neuroscience, 2022, 4515642, (2022), https:\/\/downloads.hindawi.com\/journals\/cin\/2022\/4515642.pdf. [Online]. Available: https:\/\/app.dimensions.ai\/details\/publication\/pub.1151587372","DOI":"10.1155\/2022\/4515642"},{"key":"1139_CR15","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, Y., Yu, X., Yang, T., Dong, L., Wang, W.: \u201cIot-apiscanner: Detecting api unauthorized access vulnerabilities of iot platform,\u201d in 2020 29th International Conference on Computer Communications and Networks (ICCCN), 1\u20135 (2020)","DOI":"10.1109\/ICCCN49398.2020.9209626"},{"key":"1139_CR16","first-page":"37","volume":"2022","author":"A Ahmed","year":"2022","unstructured":"Ahmed, A., Alheeti, K.M.A.: \u201cIntelligent identification of unauthorized internet of things devices,\u2019\u2019 in. Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU) 2022, 37\u201342 (2022)","journal-title":"Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU)"},{"key":"1139_CR17","doi-asserted-by":"publisher","first-page":"2269","DOI":"10.1109\/ACCESS.2021.3137201","volume":"10","author":"M Zeeshan","year":"2022","unstructured":"Zeeshan, M., Riaz, Q., Bilal, M.A., Shahzad, M.K., Jabeen, H., Haider, S.A., Rahim, A.: Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets. IEEE Access 10, 2269\u20132283 (2022)","journal-title":"IEEE Access"},{"key":"1139_CR18","doi-asserted-by":"publisher","unstructured":"Dan,D.\u00a0V., Thanh, T.\u00a0M.: \u201cNetwork traffic attention features fusion forunauthorized iot devices detection,\u201d Journal on Information Technologies & Communications, 2024(1), 1\u201310, (2023). [Online]. Available:https:\/\/doi.org\/10.32913\/mic-ict-research.v2024.n1.1205","DOI":"10.32913\/mic-ict-research.v2024.n1.1205"},{"key":"1139_CR19","doi-asserted-by":"publisher","unstructured":"Dan, D.\u00a0V., Khanh, T.\u00a0N., Thanh, T.\u00a0M.: \u201cNetwork traffic feature behaviour augmentation fusion based attacks classification for intrusion detection system in sdn framework,\u201d Journal on Information Technologies & Communications, 2024(2), 70\u201379, (2024). [Online]. Available: https:\/\/doi.org\/10.32913\/mic-ict-research.v2024.n2.1247","DOI":"10.32913\/mic-ict-research.v2024.n2.1247"},{"key":"1139_CR20","doi-asserted-by":"publisher","unstructured":"Yadav, P., Feraudo, A., Arief, B., Shahandashti, S.\u00a0F., Vassilakis, V.\u00a0G.: \u201cPosition paper: A systematic framework for categorising iot device fingerprinting mechanisms,\u201d in Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, ser. AIChallengeIoT \u201920. New York, NY, USA: Association for Computing Machinery, p. 62 68. (2020) [Online]. Available: https:\/\/doi.org\/10.1145\/3417313.3429384","DOI":"10.1145\/3417313.3429384"},{"key":"1139_CR21","unstructured":"Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N.\u00a0O., Guarnizo, J., Elovici, Y.: \u201cDetection of unauthorized iot devices using machine learning techniques,\u201d 09 (2017)"},{"issue":"4","key":"1139_CR22","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/TASLP.2015.2409733","volume":"23","author":"H Huang","year":"2015","unstructured":"Huang, H., Xu, H., Wang, X., Silamu, W.: Maximum f1-score discriminative training criterion for automatic mispronunciation detection. IEEE\/ACM Transactions on Audio, Speech, and Language Processing 23(4), 787\u2013797 (2015)","journal-title":"IEEE\/ACM Transactions on Audio, Speech, and Language Processing"},{"issue":"23","key":"1139_CR23","doi-asserted-by":"publisher","first-page":"23741","DOI":"10.1109\/JIOT.2022.3191951","volume":"9","author":"K Kostas","year":"2022","unstructured":"Kostas, K., Just, M., Lones, M.A.: Iotdevid: A behavior-based device identification method for the iot. IEEE Internet of Things Journal 9(23), 23741\u201323749 (2022)","journal-title":"IEEE Internet of Things Journal"},{"key":"1139_CR24","doi-asserted-by":"crossref","unstructured":"Douzas, G., Bacao, F.: \u201cGeometric smote a geometrically enhanced drop-in replacement for smote,\u201d Information Sciences, 501, 118\u2013135, (2019(. [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025519305353","DOI":"10.1016\/j.ins.2019.06.007"},{"issue":"6","key":"1139_CR25","doi-asserted-by":"publisher","first-page":"4179","DOI":"10.1109\/TII.2020.3009159","volume":"17","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Hu, J., Min, G., Zhao, Z., Wang, J.: Data-augmentation-based cellular traffic prediction in edge-computing-enabled smart city. IEEE Trans. Industr. Inf. 17(6), 4179\u20134187 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"1139_CR26","unstructured":"Lema\u00eetre, G., Nogueira, F., Aridas, C.\u00a0K.: \u201cImbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning,\u201d Journal of Machine Learning Research, 18(17), 1\u20135, (2017). [Online]. Available: http:\/\/jmlr.org\/papers\/v18\/16-365"},{"key":"1139_CR27","doi-asserted-by":"crossref","unstructured":"Sherstinsky, A.: \u201cFundamentals of recurrent neural network (rnn) and long short-term memory (lstm) network,\u201d Physica D: Nonlinear Phenomena, 404, 132306, (2020). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167278919305974","DOI":"10.1016\/j.physd.2019.132306"},{"key":"1139_CR28","doi-asserted-by":"publisher","unstructured":"Yu, Y., Si, X., Hu, C., Zhang, J.: \u201cA Review of Recurrent Neural Networks: LSTM Cells and Network Architectures,\u201d Neural Computation, 31(7), 1235\u20131270, (2019). [Online]. Available: https:\/\/doi.org\/10.1162\/neco_a_01199","DOI":"10.1162\/neco_a_01199"},{"key":"1139_CR29","doi-asserted-by":"crossref","unstructured":"Dey, R., Salem, F.\u00a0M.: \u201cGate-variants of gated recurrent unit (gru) neural networks,\u201d in 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), 1597\u20131600 (2017)","DOI":"10.1109\/MWSCAS.2017.8053243"},{"key":"1139_CR30","doi-asserted-by":"publisher","first-page":"125562","DOI":"10.1109\/ACCESS.2019.2937521","volume":"7","author":"I Garc\u00eda-Magari\u00f1o","year":"2019","unstructured":"Garc\u00eda-Magari\u00f1o, I., Muttukrishnan, R., Lloret, J.: Human-centric ai for trustworthy iot systems with explainable multilayer perceptrons. IEEE Access 7, 125562\u2013125574 (2019)","journal-title":"IEEE Access"},{"key":"1139_CR31","doi-asserted-by":"crossref","unstructured":"Ray, S.: \u201cA quick review of machine learning algorithms,\u201d in 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), 35\u201339 (2019)","DOI":"10.1109\/COMITCon.2019.8862451"},{"key":"1139_CR32","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-030-13453-2_12","volume-title":"ECML PKDD 2018 Workshops","author":"A Chawla","year":"2019","unstructured":"Chawla, A., Lee, B., Fallon, S., Jacob, P.: Host based intrusion detection system with combined cnn\/rnn model. In: Alzate, C., Monreale, A., Assem, H., Bifet, A., Buda, T.S., Caglayan, B., Drury, B., Garc\u00eda-Mart\u00edn, E., Gavald\u00e0, R., Koprinska, I., Kramer, S., Lavesson, N., Madden, M., Molloy, I., Nicolae, M.-I., Sinn, M. (eds.) ECML PKDD 2018 Workshops, pp. 149\u2013158. Springer International Publishing, Cham (2019)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01139-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01139-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01139-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T07:05:17Z","timestamp":1764572717000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01139-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,22]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["1139"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01139-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,10,22]]},"assertion":[{"value":"19 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"225"}}