{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:49:52Z","timestamp":1762300192809,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10586-022-03769-y","type":"journal-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T19:02:37Z","timestamp":1666033357000},"page":"3719-3736","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Intelligent intrusion detection based on fuzzy Big Data classification"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7511-1221","authenticated-orcid":false,"given":"Farah","family":"Jemili","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"3769_CR1","doi-asserted-by":"publisher","first-page":"31711","DOI":"10.1109\/ACCESS.2019.2903723","volume":"7","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Li, P., Wang, X.: Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711\u201331722 (2019)","journal-title":"IEEE Access"},{"key":"3769_CR2","doi-asserted-by":"crossref","unstructured":"Alazzam, H., Alsmady, A., Shorman, A.A.: Supervised detection of iot botnet attacks. In: Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems, pp. 1\u20136 (2019)","DOI":"10.1145\/3368691.3368733"},{"key":"3769_CR3","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garcia","year":"2014","unstructured":"Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100\u2013123 (2014)","journal-title":"Comput. Secur."},{"issue":"7","key":"3769_CR4","doi-asserted-by":"publisher","first-page":"1541","DOI":"10.1007\/s00521-015-2128-0","volume":"28","author":"K Alieyan","year":"2017","unstructured":"Alieyan, K., Almomani, A., Manasrah, A., Kadhum, M.M.: A survey of botnet detection based on dns. Neural Comput. Appl. 28(7), 1541\u20131558 (2017)","journal-title":"Neural Comput. Appl."},{"key":"3769_CR5","first-page":"619","volume":"3","author":"S Garasia","year":"2012","unstructured":"Garasia, S., Rana, D., Mehta, R.: Http botnet detection using frequent pattern set mining. Int. J. Eng. Sci. Adv. Technol. (IJESAT) 3, 619\u2013624 (2012)","journal-title":"Int. J. Eng. Sci. Adv. Technol. (IJESAT)"},{"key":"3769_CR6","doi-asserted-by":"publisher","unstructured":"Mondher, E., Jemili, F.: Combining intrusion detection datasets using MapReduce. In: Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC). https:\/\/doi.org\/10.1109\/SMC.2016.7844977 (2016)","DOI":"10.1109\/SMC.2016.7844977"},{"key":"3769_CR7","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100969","author":"VE Adeyemo","year":"2019","unstructured":"Adeyemo, V.E., Abdullah, A., JhanJhi, N.Z., Supramaniam, M., Balogun, A.O.: Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. Int. J. Adv. Comput. Sci. Appl. (2019). https:\/\/doi.org\/10.14569\/IJACSA.2019.0100969","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"3769_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2564-5","author":"M Alauthaman","year":"2016","unstructured":"Alauthaman, M., Aslam, N., Zhang, L., Alasem, R., Hossain, M.A.: A p2p botnet detection scheme based on decision tree and adaptive multilayer neural networks. Neural Comput. Appl. (2016). https:\/\/doi.org\/10.1007\/s00521-016-2564-5","journal-title":"Neural Comput. Appl."},{"key":"3769_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.compeleceng.2016.01.012","volume":"50","author":"G Kirubavathi","year":"2016","unstructured":"Kirubavathi, G., Anitha, R.: Botnet detection via mining of traffic flow characteristics. Comput. Electr. Eng. 50, 91\u2013101 (2016)","journal-title":"Comput. Electr. Eng."},{"key":"3769_CR10","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1155\/2017\/6047053","volume":"2017","author":"R Kozik","year":"2017","unstructured":"Kozik, R., Choras, M.: Pattern extraction algorithm for netflow-based botnet activities detection. Secur. Commun. Netw. 2017, 10 (2017). https:\/\/doi.org\/10.1155\/2017\/6047053","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"3769_CR11","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1007\/s00500-015-1863-6","volume":"21","author":"W Ye","year":"2017","unstructured":"Ye, W., Cho, K.: P2p and p2p botnet traffic classification in two stages. Soft Comput. 21(5), 1315\u20131326 (2017)","journal-title":"Soft Comput."},{"key":"3769_CR12","doi-asserted-by":"crossref","unstructured":"Gaied, I., Jemili, F., Korbaa, O.: Intrusion detection based on neuro-fuzzy classification. In: Proceedings of the IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech (2015)","DOI":"10.1109\/AICCSA.2015.7507112"},{"key":"3769_CR13","doi-asserted-by":"crossref","unstructured":"Gaied, I., Jemili, F., Korbaa, O.: A genetic fuzzy classification approach to improve high-dimensional intrusion detection system. In: Proceedings of the 16th International Conference on Intelligent Systems Design and Applications, Porto (2016)","DOI":"10.1007\/978-3-319-53480-0_32"},{"key":"3769_CR14","doi-asserted-by":"crossref","unstructured":"Gaied, I., Jemili, F., Korbaa, O.: Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: comparative study. In: Proceedings of the 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2017), split (2017)","DOI":"10.23919\/SOFTCOM.2017.8115566"},{"issue":"1","key":"3769_CR15","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","volume":"42","author":"S Elhag","year":"2015","unstructured":"Elhag, S., Fernandez, A., Bawakid, A., Alshomrani, S., Herrera, F.: On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst. Appl. 42(1), 193\u2013202 (2015)","journal-title":"Expert Syst. Appl."},{"key":"3769_CR16","unstructured":"Huang, J.: International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), IEEE, 12\u201314 June (2020)"},{"key":"3769_CR17","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.procs.2015.04.231","volume":"49","author":"D Gaikwad","year":"2015","unstructured":"Gaikwad, D., Thool, R.C.: Intrusion detection system using bagging with partial decision tree base classifier. Procedia Comput. Sci. 49, 92\u201398 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"1\u20135","key":"3769_CR18","first-page":"11","volume":"135","author":"N Bisht","year":"2016","unstructured":"Bisht, N., Ahmad, A., Bisht, S.: Application of feature selection methods and ensembles on network security dataset. Int. J. Comput. Appl. 135(1\u20135), 11 (2016)","journal-title":"Int. J. Comput. Appl."},{"key":"3769_CR19","unstructured":"Prusti, D.: Efficient intrusion detection model using ensemble methods. PhD thesis (2015)"},{"issue":"2","key":"3769_CR20","first-page":"1","volume":"99","author":"B Revanth","year":"2014","unstructured":"Revanth, B.: Hybrid intelligent intrusion detection system using bayesian and genetic algorithm (baga): comparitive study. Int. J. Comput. Appl. 99(2), 1\u20138 (2014)","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"3769_CR21","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1080\/18756891.2013.802114","volume":"6","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Kwok, L.-F.: Enhancing false alarm reduction using voted ensemble selection in intrusion detection. Int. J. Comput. Intell. Syst. 6(4), 626\u2013638 (2013)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"3769_CR22","unstructured":"Govindarajan, M., Chandrasekaran, R.: Intrusion detection using an ensemble of classification methods. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 1, pp. 459\u2013464 (2012)"},{"issue":"02","key":"3769_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218213015500335","volume":"25","author":"M Amini","year":"2016","unstructured":"Amini, M., Rezaeenour, J., Hadavandi, E.: A neural network ensemble classifier for effective intrusion detection using fuzzy clustering and radial basis function networks. Int. J. Artif. Intell. Tools 25(02), 1\u201332 (2016)","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"3769_CR24","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1007\/s10586-021-03247-x","volume":"24","author":"JS Pan","year":"2021","unstructured":"Pan, J.S., Shan, J., Zheng, S.G., et al.: Wind power prediction based on neural network with optimization of adaptive multi-group salp swarm algorithm. Clust. Comput. 24, 2083\u20132098 (2021). https:\/\/doi.org\/10.1007\/s10586-021-03247-x","journal-title":"Clust. Comput."},{"issue":"2","key":"3769_CR25","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s40860-020-00120-3","volume":"7","author":"MM Alani","year":"2021","unstructured":"Alani, M.M.: Big data in cybersecurity: a survey of applications and future trends. J. Reliab. Intell. Environ. 7(2), 85\u2013114 (2021)","journal-title":"J. Reliab. Intell. Environ."},{"issue":"1","key":"3769_CR26","first-page":"21","volume":"5","author":"MP Sesmero","year":"2015","unstructured":"Sesmero, M.P., Ledezma, A.I., Sanchis, A.: Generating ensembles of heterogeneous classifiers using stacked generalization. Wiley Interdiscip. Rev. 5(1), 21\u201334 (2015)","journal-title":"Wiley Interdiscip. Rev."},{"key":"3769_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neucom.2016.12.038","volume":"234","author":"W Liu","year":"2017","unstructured":"Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11\u201326 (2017)","journal-title":"Neurocomputing"},{"key":"3769_CR28","unstructured":"Abdulrahaman, M.D., Alhassan, J.K.: Ensemble learning approach for the enhancement of performance of intrusion detection system. In: Proceedings of the International Conference on Information and Communication Technology and its Applications (ICTA), pp. 1\u2013 8 (2018)"},{"key":"3769_CR29","doi-asserted-by":"publisher","first-page":"3367","DOI":"10.1007\/s10586-021-03331-2","volume":"24","author":"S El Motaki","year":"2021","unstructured":"El Motaki, S., Yahyaouy, A., Gualous, H., et al.: A new weighted fuzzy C-means clustering for workload monitoring in cloud datacenter platforms. Clust. Comput. 24, 3367\u20133379 (2021). https:\/\/doi.org\/10.1007\/s10586-021-03331-2","journal-title":"Clust. Comput."},{"issue":"23","key":"3769_CR30","doi-asserted-by":"publisher","first-page":"3064","DOI":"10.1016\/j.fss.2010.05.016","volume":"161","author":"A Fernandez","year":"2010","unstructured":"Fernandez, A., Calderon, M., Barrenechea, E., Bustince, H., Herrera, F.: Solving multi-class problems with linguistic fuzzy rule based classification systems based on pairwise learning and preference relations. Fuzzy Sets Syst. 161(23), 3064\u20133080 (2010)","journal-title":"Fuzzy Sets Syst."},{"key":"3769_CR31","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.neucom.2016.06.021","volume":"214","author":"C Guo","year":"2016","unstructured":"Guo, C., Ping, Y., Liu, N., Luo, S.S.: A two-level hybrid approach for intrusion detection. Neurocomputing 214, 391\u2013400 (2016)","journal-title":"Neurocomputing"},{"key":"3769_CR32","unstructured":"Microsoft. Azure Regions. https:\/\/azure.microsoft.com\/en-us\/global-infrastructure\/regions\/"},{"key":"3769_CR33","unstructured":"Mllib Evaluation Metrics. https:\/\/spark.apache.org\/docs\/2.1.0\/mllib-evaluation-metrics.html"},{"key":"3769_CR34","unstructured":"Premasundari, M., Yamini, C.: A violent crime analysis using fuzzy C-means clustering approach, 6956 (2019)"},{"key":"3769_CR35","doi-asserted-by":"publisher","unstructured":"Belhor, M., Jemili, F.: Intrusion detection based on genetic fuzzy classification system. In: Proceedings of the 13th ACS\/IEEE International Conference on Computer Systems and Applications AICCSA. https:\/\/doi.org\/10.1109\/AICCSA.2016.7945690 (2016)","DOI":"10.1109\/AICCSA.2016.7945690"},{"issue":"1","key":"3769_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc3010001","volume":"3","author":"M Hafsa","year":"2018","unstructured":"Hafsa, M., Jemili, F.: Comparative study between big data analysis techniques in intrusion detection. Big Data Cognit. Comput. 3(1), 1 (2018). https:\/\/doi.org\/10.3390\/bdcc3010001","journal-title":"Big Data Cognit. Comput."},{"key":"3769_CR37","doi-asserted-by":"publisher","first-page":"91038","DOI":"10.1109\/ACCESS.2021.3092054","volume":"9","author":"M Panda","year":"2021","unstructured":"Panda, M., Abd Allah, A.M., Hassanien, A.E.: Developing an efficient feature engineering and machine learning model for detecting IoT-Botnet cyber attacks. IEEE Access 9, 91038\u201391052 (2021)","journal-title":"IEEE Access"},{"issue":"3","key":"3769_CR38","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0165-0114(97)00009-2","volume":"89","author":"D Nauck","year":"1997","unstructured":"Nauck, D., Kruse, R.: A neuro-fuzzy method to learn fuzzy classification rules from data. Fuzzy Sets Syst. 89(3), 277\u2013288 (1997)","journal-title":"Fuzzy Sets Syst."},{"key":"3769_CR39","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1007\/s10586-020-03222-y","volume":"24","author":"S Krishnaveni","year":"2021","unstructured":"Krishnaveni, S., Sivamohan, S., Sridhar, S.S., et al.: Efficient feature selection and classification through ensemble method for network intrusion detection on cloud computing. Clust. Comput. 24, 1761\u20131779 (2021). https:\/\/doi.org\/10.1007\/s10586-020-03222-y","journal-title":"Clust. Comput."},{"key":"3769_CR40","unstructured":"Garcia, S.: Dataset ctu-13, web page, Tech. rep. https:\/\/stratosphereips.org\/category\/dataset.html (2015)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03769-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03769-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03769-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T20:08:34Z","timestamp":1697486914000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03769-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["3769"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03769-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"12 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}